Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

13/08/2024, 08:41

240813-klh2nstfje 10

13/08/2024, 08:34

240813-kgp97aybnm 7

13/08/2024, 08:31

240813-ke339stcnh 7

13/08/2024, 08:22

240813-j9la9stama 10

13/08/2024, 08:15

240813-j5ww7sxeqm 10

13/08/2024, 08:11

240813-j3kq6axdpl 6

13/08/2024, 08:07

240813-jz4d4aseke 10

Analysis

  • max time kernel
    530s
  • max time network
    531s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    13/08/2024, 08:22

General

  • Target

    free-vpn-3.2-installer_96-miv1.exe

  • Size

    1.7MB

  • MD5

    2798a45b6137fdc262bc01d6c13a2c7d

  • SHA1

    743587eb5afd358591146b8222d2b97d82cb9d1f

  • SHA256

    d69299761308057d6288300f98222484af40c1ebc98432bcbcc9c737ac219245

  • SHA512

    4c8b70261ec5fe915b2c3dcfb6ff644873adcf0d8abb1ba83be30eb600bf1c7fbd6bbd5d0730a610f129e3492517e7cd77e882e9f7b3bfa214e73bfbd361be1b

  • SSDEEP

    24576:W7FUDowAyrTVE3U5F/XkbjztjfSKh7P/1Ks6vk9XpSwR1HNmJrFxgzUsYz:WBuZrEUcztdqAXpSwRWNQ9Y

Malware Config

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Drops file in Drivers directory 2 IoCs
  • Sets file to hidden 1 TTPs 64 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Drops startup file 4 IoCs
  • Adds Run key to start application 2 TTPs 64 IoCs
  • Downloads MZ/PE file
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Modifies WinLogon for persistence 2 TTPs 62 IoCs
  • Executes dropped EXE 64 IoCs
  • Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 8 IoCs

    When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 19 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 20 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\free-vpn-3.2-installer_96-miv1.exe
    "C:\Users\Admin\AppData\Local\Temp\free-vpn-3.2-installer_96-miv1.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3704
    • C:\Users\Admin\AppData\Local\Temp\is-AAGR9.tmp\free-vpn-3.2-installer_96-miv1.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-AAGR9.tmp\free-vpn-3.2-installer_96-miv1.tmp" /SL5="$602AA,837551,832512,C:\Users\Admin\AppData\Local\Temp\free-vpn-3.2-installer_96-miv1.exe"
      2⤵
      • Executes dropped EXE
      PID:3388
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2092
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffe45773cb8,0x7ffe45773cc8,0x7ffe45773cd8
      2⤵
        PID:1692
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1860 /prefetch:2
        2⤵
          PID:1552
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2340 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3124
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2592 /prefetch:8
          2⤵
            PID:3628
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:1
            2⤵
              PID:3188
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:1
              2⤵
                PID:2428
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:1
                2⤵
                  PID:4668
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4084 /prefetch:1
                  2⤵
                    PID:1004
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4356 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2296
                  • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5288 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:1068
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:1
                    2⤵
                      PID:1176
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4112 /prefetch:1
                      2⤵
                        PID:5000
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:1
                        2⤵
                          PID:2376
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:1
                          2⤵
                            PID:2412
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3832 /prefetch:8
                            2⤵
                              PID:2808
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=4404 /prefetch:8
                              2⤵
                              • Modifies registry class
                              • Suspicious behavior: EnumeratesProcesses
                              PID:2920
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3524 /prefetch:1
                              2⤵
                                PID:4168
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:1
                                2⤵
                                  PID:1896
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:1
                                  2⤵
                                    PID:3424
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:1
                                    2⤵
                                      PID:4484
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:1
                                      2⤵
                                        PID:3020
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6092 /prefetch:1
                                        2⤵
                                          PID:3108
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6440 /prefetch:8
                                          2⤵
                                            PID:1780
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6260 /prefetch:8
                                            2⤵
                                            • Subvert Trust Controls: Mark-of-the-Web Bypass
                                            • NTFS ADS
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:2296
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7036 /prefetch:1
                                            2⤵
                                              PID:4824
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7204 /prefetch:8
                                              2⤵
                                                PID:4636
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=1716 /prefetch:8
                                                2⤵
                                                  PID:4828
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5548 /prefetch:8
                                                  2⤵
                                                  • Subvert Trust Controls: Mark-of-the-Web Bypass
                                                  • NTFS ADS
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:3836
                                                • C:\Users\Admin\Downloads\Blackkomet.exe
                                                  "C:\Users\Admin\Downloads\Blackkomet.exe"
                                                  2⤵
                                                  • Adds Run key to start application
                                                  • Drops file in System32 directory
                                                  • Modifies WinLogon for persistence
                                                  • Executes dropped EXE
                                                  • Modifies registry class
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:2588
                                                  • C:\Windows\SysWOW64\attrib.exe
                                                    attrib "C:\Users\Admin\Downloads\Blackkomet.exe" +s +h
                                                    3⤵
                                                    • Views/modifies file attributes
                                                    PID:1348
                                                  • C:\Windows\SysWOW64\attrib.exe
                                                    attrib "C:\Users\Admin\Downloads" +s +h
                                                    3⤵
                                                    • Sets file to hidden
                                                    • Views/modifies file attributes
                                                    PID:3784
                                                  • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                    "C:\Windows\system32\Windupdt\winupdate.exe"
                                                    3⤵
                                                    • Adds Run key to start application
                                                    • Modifies WinLogon for persistence
                                                    • Executes dropped EXE
                                                    • Modifies registry class
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:4188
                                                    • C:\Windows\SysWOW64\attrib.exe
                                                      attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                      4⤵
                                                      • Sets file to hidden
                                                      • Views/modifies file attributes
                                                      PID:1480
                                                    • C:\Windows\SysWOW64\attrib.exe
                                                      attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                      4⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:3604
                                                    • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                      "C:\Windows\system32\Windupdt\winupdate.exe"
                                                      4⤵
                                                      • Adds Run key to start application
                                                      • Drops file in System32 directory
                                                      • Modifies WinLogon for persistence
                                                      • Executes dropped EXE
                                                      • Modifies registry class
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:3480
                                                      • C:\Windows\SysWOW64\attrib.exe
                                                        attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                        5⤵
                                                        • Sets file to hidden
                                                        • Drops file in System32 directory
                                                        • Views/modifies file attributes
                                                        PID:2032
                                                      • C:\Windows\SysWOW64\attrib.exe
                                                        attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                        5⤵
                                                        • Views/modifies file attributes
                                                        PID:1560
                                                      • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                        "C:\Windows\system32\Windupdt\winupdate.exe"
                                                        5⤵
                                                        • Adds Run key to start application
                                                        • Modifies WinLogon for persistence
                                                        • Executes dropped EXE
                                                        • System Location Discovery: System Language Discovery
                                                        • Modifies registry class
                                                        PID:2852
                                                        • C:\Windows\SysWOW64\attrib.exe
                                                          attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                          6⤵
                                                          • Sets file to hidden
                                                          PID:2740
                                                        • C:\Windows\SysWOW64\attrib.exe
                                                          attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                          6⤵
                                                          • Drops file in System32 directory
                                                          PID:2768
                                                        • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                          "C:\Windows\system32\Windupdt\winupdate.exe"
                                                          6⤵
                                                          • Adds Run key to start application
                                                          • Modifies WinLogon for persistence
                                                          • Executes dropped EXE
                                                          • Modifies registry class
                                                          PID:2640
                                                          • C:\Windows\SysWOW64\attrib.exe
                                                            attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                            7⤵
                                                            • System Location Discovery: System Language Discovery
                                                            • Views/modifies file attributes
                                                            PID:4368
                                                          • C:\Windows\SysWOW64\attrib.exe
                                                            attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                            7⤵
                                                            • Sets file to hidden
                                                            • Views/modifies file attributes
                                                            PID:4444
                                                          • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                            "C:\Windows\system32\Windupdt\winupdate.exe"
                                                            7⤵
                                                            • Adds Run key to start application
                                                            • Drops file in System32 directory
                                                            • Modifies WinLogon for persistence
                                                            • Executes dropped EXE
                                                            • Modifies registry class
                                                            PID:1492
                                                            • C:\Windows\SysWOW64\attrib.exe
                                                              attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                              8⤵
                                                              • Sets file to hidden
                                                              • System Location Discovery: System Language Discovery
                                                              PID:4112
                                                            • C:\Windows\SysWOW64\attrib.exe
                                                              attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                              8⤵
                                                                PID:1524
                                                              • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                8⤵
                                                                • Adds Run key to start application
                                                                • Modifies WinLogon for persistence
                                                                • Executes dropped EXE
                                                                • Modifies registry class
                                                                PID:4740
                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                  attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                  9⤵
                                                                    PID:2408
                                                                  • C:\Windows\SysWOW64\attrib.exe
                                                                    attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                    9⤵
                                                                      PID:1284
                                                                    • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                      "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                      9⤵
                                                                      • Adds Run key to start application
                                                                      • Drops file in System32 directory
                                                                      • Modifies WinLogon for persistence
                                                                      • Executes dropped EXE
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Modifies registry class
                                                                      PID:1820
                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                        attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                        10⤵
                                                                        • Views/modifies file attributes
                                                                        PID:224
                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                        attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                        10⤵
                                                                        • Sets file to hidden
                                                                        • Views/modifies file attributes
                                                                        PID:1592
                                                                      • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                        "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                        10⤵
                                                                        • Adds Run key to start application
                                                                        • Modifies WinLogon for persistence
                                                                        • Executes dropped EXE
                                                                        • Modifies registry class
                                                                        PID:2164
                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                          attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                          11⤵
                                                                          • Sets file to hidden
                                                                          • Views/modifies file attributes
                                                                          PID:3144
                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                          attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                          11⤵
                                                                            PID:4532
                                                                          • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                            "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                            11⤵
                                                                            • Adds Run key to start application
                                                                            • Modifies WinLogon for persistence
                                                                            • Executes dropped EXE
                                                                            • Modifies registry class
                                                                            PID:3520
                                                                            • C:\Windows\SysWOW64\attrib.exe
                                                                              attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                              12⤵
                                                                              • Sets file to hidden
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Views/modifies file attributes
                                                                              PID:3412
                                                                            • C:\Windows\SysWOW64\attrib.exe
                                                                              attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                              12⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Views/modifies file attributes
                                                                              PID:1252
                                                                            • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                              "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                              12⤵
                                                                              • Adds Run key to start application
                                                                              • Modifies WinLogon for persistence
                                                                              • Executes dropped EXE
                                                                              • Modifies registry class
                                                                              PID:4480
                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                13⤵
                                                                                • Sets file to hidden
                                                                                • Drops file in System32 directory
                                                                                PID:3020
                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                13⤵
                                                                                • Sets file to hidden
                                                                                PID:3652
                                                                              • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                13⤵
                                                                                • Adds Run key to start application
                                                                                • Modifies WinLogon for persistence
                                                                                • Executes dropped EXE
                                                                                • Modifies registry class
                                                                                PID:2884
                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                  attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                  14⤵
                                                                                  • Sets file to hidden
                                                                                  PID:3756
                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                  attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                  14⤵
                                                                                  • Sets file to hidden
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Views/modifies file attributes
                                                                                  PID:4248
                                                                                • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                  "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                  14⤵
                                                                                  • Adds Run key to start application
                                                                                  • Modifies WinLogon for persistence
                                                                                  • Executes dropped EXE
                                                                                  • Modifies registry class
                                                                                  PID:4556
                                                                                  • C:\Windows\SysWOW64\attrib.exe
                                                                                    attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                    15⤵
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Views/modifies file attributes
                                                                                    PID:4188
                                                                                  • C:\Windows\SysWOW64\attrib.exe
                                                                                    attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                    15⤵
                                                                                    • Sets file to hidden
                                                                                    PID:1396
                                                                                  • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                    "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                    15⤵
                                                                                    • Adds Run key to start application
                                                                                    • Drops file in System32 directory
                                                                                    • Modifies WinLogon for persistence
                                                                                    • Executes dropped EXE
                                                                                    • Modifies registry class
                                                                                    PID:2948
                                                                                    • C:\Windows\SysWOW64\attrib.exe
                                                                                      attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                      16⤵
                                                                                      • Sets file to hidden
                                                                                      PID:2892
                                                                                    • C:\Windows\SysWOW64\attrib.exe
                                                                                      attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                      16⤵
                                                                                      • Sets file to hidden
                                                                                      • Drops file in System32 directory
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      • Views/modifies file attributes
                                                                                      PID:3988
                                                                                    • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                      "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                      16⤵
                                                                                      • Adds Run key to start application
                                                                                      • Drops file in System32 directory
                                                                                      • Modifies WinLogon for persistence
                                                                                      • Executes dropped EXE
                                                                                      • Modifies registry class
                                                                                      PID:4368
                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                        attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                        17⤵
                                                                                        • Sets file to hidden
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        PID:4784
                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                        attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                        17⤵
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        • Views/modifies file attributes
                                                                                        PID:4796
                                                                                      • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                        "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                        17⤵
                                                                                        • Adds Run key to start application
                                                                                        • Modifies WinLogon for persistence
                                                                                        • Executes dropped EXE
                                                                                        • Modifies registry class
                                                                                        PID:1116
                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                          attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                          18⤵
                                                                                            PID:1652
                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                            attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                            18⤵
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            • Views/modifies file attributes
                                                                                            PID:2172
                                                                                          • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                            "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                            18⤵
                                                                                            • Adds Run key to start application
                                                                                            • Modifies WinLogon for persistence
                                                                                            • Executes dropped EXE
                                                                                            • Modifies registry class
                                                                                            PID:3652
                                                                                            • C:\Windows\SysWOW64\attrib.exe
                                                                                              attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                              19⤵
                                                                                              • Sets file to hidden
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              • Views/modifies file attributes
                                                                                              PID:3020
                                                                                            • C:\Windows\SysWOW64\attrib.exe
                                                                                              attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                              19⤵
                                                                                                PID:3660
                                                                                              • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                                "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                                19⤵
                                                                                                • Adds Run key to start application
                                                                                                • Drops file in System32 directory
                                                                                                • Modifies WinLogon for persistence
                                                                                                • Executes dropped EXE
                                                                                                • Modifies registry class
                                                                                                PID:3960
                                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                                  attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                                  20⤵
                                                                                                  • Sets file to hidden
                                                                                                  PID:1032
                                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                                  attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                                  20⤵
                                                                                                  • Sets file to hidden
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  • Views/modifies file attributes
                                                                                                  PID:1708
                                                                                                • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                                  "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                                  20⤵
                                                                                                  • Adds Run key to start application
                                                                                                  • Drops file in System32 directory
                                                                                                  • Modifies WinLogon for persistence
                                                                                                  • Executes dropped EXE
                                                                                                  • Modifies registry class
                                                                                                  PID:3180
                                                                                                  • C:\Windows\SysWOW64\attrib.exe
                                                                                                    attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                                    21⤵
                                                                                                    • Sets file to hidden
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Views/modifies file attributes
                                                                                                    PID:4884
                                                                                                  • C:\Windows\SysWOW64\attrib.exe
                                                                                                    attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                                    21⤵
                                                                                                    • Sets file to hidden
                                                                                                    PID:3484
                                                                                                  • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                                    "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                                    21⤵
                                                                                                    • Adds Run key to start application
                                                                                                    • Drops file in System32 directory
                                                                                                    • Modifies WinLogon for persistence
                                                                                                    • Executes dropped EXE
                                                                                                    • Modifies registry class
                                                                                                    PID:3676
                                                                                                    • C:\Windows\SysWOW64\attrib.exe
                                                                                                      attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                                      22⤵
                                                                                                      • Sets file to hidden
                                                                                                      • Drops file in System32 directory
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      PID:2800
                                                                                                    • C:\Windows\SysWOW64\attrib.exe
                                                                                                      attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                                      22⤵
                                                                                                      • Sets file to hidden
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      PID:2320
                                                                                                    • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                                      "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                                      22⤵
                                                                                                      • Adds Run key to start application
                                                                                                      • Drops file in System32 directory
                                                                                                      • Modifies WinLogon for persistence
                                                                                                      • Executes dropped EXE
                                                                                                      • Modifies registry class
                                                                                                      PID:1620
                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                        attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                                        23⤵
                                                                                                        • Drops file in System32 directory
                                                                                                        • Views/modifies file attributes
                                                                                                        PID:1336
                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                        attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                                        23⤵
                                                                                                        • Drops file in System32 directory
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:1884
                                                                                                      • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                                        "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                                        23⤵
                                                                                                        • Adds Run key to start application
                                                                                                        • Modifies WinLogon for persistence
                                                                                                        • Executes dropped EXE
                                                                                                        • Modifies registry class
                                                                                                        PID:2440
                                                                                                        • C:\Windows\SysWOW64\notepad.exe
                                                                                                          notepad
                                                                                                          24⤵
                                                                                                          • Adds Run key to start application
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:1200
                                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                                          attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                                          24⤵
                                                                                                          • Sets file to hidden
                                                                                                          • Views/modifies file attributes
                                                                                                          PID:4844
                                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                                          attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                                          24⤵
                                                                                                          • Sets file to hidden
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          • Views/modifies file attributes
                                                                                                          PID:1652
                                                                                                        • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                                          "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                                          24⤵
                                                                                                          • Adds Run key to start application
                                                                                                          • Drops file in System32 directory
                                                                                                          • Modifies WinLogon for persistence
                                                                                                          • Executes dropped EXE
                                                                                                          • Modifies registry class
                                                                                                          PID:1492
                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                            attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                                            25⤵
                                                                                                            • Sets file to hidden
                                                                                                            PID:2384
                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                            attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                                            25⤵
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            • Views/modifies file attributes
                                                                                                            PID:3580
                                                                                                          • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                                            "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                                            25⤵
                                                                                                            • Adds Run key to start application
                                                                                                            • Drops file in System32 directory
                                                                                                            • Modifies WinLogon for persistence
                                                                                                            • Executes dropped EXE
                                                                                                            • Modifies registry class
                                                                                                            PID:4864
                                                                                                            • C:\Windows\SysWOW64\attrib.exe
                                                                                                              attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                                              26⤵
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              • Views/modifies file attributes
                                                                                                              PID:776
                                                                                                            • C:\Windows\SysWOW64\attrib.exe
                                                                                                              attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                                              26⤵
                                                                                                              • Drops file in System32 directory
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              PID:3960
                                                                                                            • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                                              "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                                              26⤵
                                                                                                              • Adds Run key to start application
                                                                                                              • Drops file in System32 directory
                                                                                                              • Modifies WinLogon for persistence
                                                                                                              • Executes dropped EXE
                                                                                                              • Modifies registry class
                                                                                                              PID:3228
                                                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                                                attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                                                27⤵
                                                                                                                • Sets file to hidden
                                                                                                                • Drops file in System32 directory
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                PID:3480
                                                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                                                attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                                                27⤵
                                                                                                                • Sets file to hidden
                                                                                                                PID:3180
                                                                                                              • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                                                "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                                                27⤵
                                                                                                                • Adds Run key to start application
                                                                                                                • Modifies WinLogon for persistence
                                                                                                                • Executes dropped EXE
                                                                                                                • Modifies registry class
                                                                                                                PID:5008
                                                                                                                • C:\Windows\SysWOW64\notepad.exe
                                                                                                                  notepad
                                                                                                                  28⤵
                                                                                                                    PID:492
                                                                                                                  • C:\Windows\SysWOW64\attrib.exe
                                                                                                                    attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                                                    28⤵
                                                                                                                      PID:4648
                                                                                                                    • C:\Windows\SysWOW64\attrib.exe
                                                                                                                      attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                                                      28⤵
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      • Views/modifies file attributes
                                                                                                                      PID:1264
                                                                                                                    • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                                                      "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                                                      28⤵
                                                                                                                      • Drops file in System32 directory
                                                                                                                      • Modifies WinLogon for persistence
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Modifies registry class
                                                                                                                      PID:3464
                                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                                        attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                                                        29⤵
                                                                                                                        • Sets file to hidden
                                                                                                                        • Views/modifies file attributes
                                                                                                                        PID:4004
                                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                                        attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                                                        29⤵
                                                                                                                        • Drops file in System32 directory
                                                                                                                        • Views/modifies file attributes
                                                                                                                        PID:4944
                                                                                                                      • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                                                        "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                                                        29⤵
                                                                                                                        • Adds Run key to start application
                                                                                                                        • Modifies WinLogon for persistence
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Modifies registry class
                                                                                                                        PID:4632
                                                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                                                          attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                                                          30⤵
                                                                                                                          • Sets file to hidden
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          PID:3020
                                                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                                                          attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                                                          30⤵
                                                                                                                          • Sets file to hidden
                                                                                                                          • Views/modifies file attributes
                                                                                                                          PID:4228
                                                                                                                        • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                                                          "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                                                          30⤵
                                                                                                                          • Adds Run key to start application
                                                                                                                          • Modifies WinLogon for persistence
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Modifies registry class
                                                                                                                          PID:1648
                                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                                            attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                                                            31⤵
                                                                                                                            • Views/modifies file attributes
                                                                                                                            PID:3704
                                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                                            attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                                                            31⤵
                                                                                                                            • Sets file to hidden
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            • Views/modifies file attributes
                                                                                                                            PID:5116
                                                                                                                          • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                                                            "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                                                            31⤵
                                                                                                                            • Adds Run key to start application
                                                                                                                            • Drops file in System32 directory
                                                                                                                            • Modifies WinLogon for persistence
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Modifies registry class
                                                                                                                            PID:4556
                                                                                                                            • C:\Windows\SysWOW64\notepad.exe
                                                                                                                              notepad
                                                                                                                              32⤵
                                                                                                                              • Adds Run key to start application
                                                                                                                              • Drops file in System32 directory
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              PID:728
                                                                                                                            • C:\Windows\SysWOW64\attrib.exe
                                                                                                                              attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                                                              32⤵
                                                                                                                              • Drops file in System32 directory
                                                                                                                              • Views/modifies file attributes
                                                                                                                              PID:3360
                                                                                                                            • C:\Windows\SysWOW64\attrib.exe
                                                                                                                              attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                                                              32⤵
                                                                                                                                PID:1800
                                                                                                                              • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                                                                "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                                                                32⤵
                                                                                                                                • Adds Run key to start application
                                                                                                                                • Modifies WinLogon for persistence
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Modifies registry class
                                                                                                                                PID:2028
                                                                                                                                • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                  notepad
                                                                                                                                  33⤵
                                                                                                                                    PID:952
                                                                                                                                  • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                    attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                                                                    33⤵
                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                    • Views/modifies file attributes
                                                                                                                                    PID:1896
                                                                                                                                  • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                    attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                                                                    33⤵
                                                                                                                                    • Sets file to hidden
                                                                                                                                    • Drops file in System32 directory
                                                                                                                                    PID:4444
                                                                                                                                  • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                                                                    "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                                                                    33⤵
                                                                                                                                    • Adds Run key to start application
                                                                                                                                    • Drops file in System32 directory
                                                                                                                                    • Modifies WinLogon for persistence
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Modifies registry class
                                                                                                                                    PID:788
                                                                                                                                    • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                      attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                                                                      34⤵
                                                                                                                                      • Sets file to hidden
                                                                                                                                      • Views/modifies file attributes
                                                                                                                                      PID:1836
                                                                                                                                    • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                      attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                                                                      34⤵
                                                                                                                                      • Views/modifies file attributes
                                                                                                                                      PID:4844
                                                                                                                                    • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                                                                      "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                                                                      34⤵
                                                                                                                                      • Adds Run key to start application
                                                                                                                                      • Modifies WinLogon for persistence
                                                                                                                                      • Executes dropped EXE
                                                                                                                                      • Modifies registry class
                                                                                                                                      PID:3240
                                                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                        attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                                                                        35⤵
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        • Views/modifies file attributes
                                                                                                                                        PID:3076
                                                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                        attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                                                                        35⤵
                                                                                                                                        • Sets file to hidden
                                                                                                                                        • Views/modifies file attributes
                                                                                                                                        PID:3556
                                                                                                                                      • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                                                                        "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                                                                        35⤵
                                                                                                                                        • Adds Run key to start application
                                                                                                                                        • Drops file in System32 directory
                                                                                                                                        • Modifies WinLogon for persistence
                                                                                                                                        • Executes dropped EXE
                                                                                                                                        • Modifies registry class
                                                                                                                                        PID:1648
                                                                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                          attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                                                                          36⤵
                                                                                                                                          • Drops file in System32 directory
                                                                                                                                          PID:4488
                                                                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                          attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                                                                          36⤵
                                                                                                                                          • Sets file to hidden
                                                                                                                                          • Views/modifies file attributes
                                                                                                                                          PID:3144
                                                                                                                                        • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                                                                          "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                                                                          36⤵
                                                                                                                                          • Drops file in System32 directory
                                                                                                                                          • Modifies WinLogon for persistence
                                                                                                                                          • Executes dropped EXE
                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                          • Modifies registry class
                                                                                                                                          PID:1264
                                                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                            attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                                                                            37⤵
                                                                                                                                            • Sets file to hidden
                                                                                                                                            PID:4652
                                                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                            attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                                                                            37⤵
                                                                                                                                            • Sets file to hidden
                                                                                                                                            • Drops file in System32 directory
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            PID:3000
                                                                                                                                          • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                                                                            "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                                                                            37⤵
                                                                                                                                            • Adds Run key to start application
                                                                                                                                            • Drops file in System32 directory
                                                                                                                                            • Modifies WinLogon for persistence
                                                                                                                                            • Executes dropped EXE
                                                                                                                                            • Modifies registry class
                                                                                                                                            PID:4052
                                                                                                                                            • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                              attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                                                                              38⤵
                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                              • Views/modifies file attributes
                                                                                                                                              PID:4828
                                                                                                                                            • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                              attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                                                                              38⤵
                                                                                                                                              • Drops file in System32 directory
                                                                                                                                              • Views/modifies file attributes
                                                                                                                                              PID:400
                                                                                                                                            • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                                                                              "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                                                                              38⤵
                                                                                                                                              • Adds Run key to start application
                                                                                                                                              • Drops file in System32 directory
                                                                                                                                              • Modifies WinLogon for persistence
                                                                                                                                              • Executes dropped EXE
                                                                                                                                              • Modifies registry class
                                                                                                                                              PID:3568
                                                                                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                                                                                39⤵
                                                                                                                                                • Views/modifies file attributes
                                                                                                                                                PID:2956
                                                                                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                                                                                39⤵
                                                                                                                                                • Views/modifies file attributes
                                                                                                                                                PID:4796
                                                                                                                                              • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                                                                                "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                                                                                39⤵
                                                                                                                                                • Adds Run key to start application
                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                • Modifies WinLogon for persistence
                                                                                                                                                • Executes dropped EXE
                                                                                                                                                • Modifies registry class
                                                                                                                                                PID:4788
                                                                                                                                                • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                  notepad
                                                                                                                                                  40⤵
                                                                                                                                                    PID:1568
                                                                                                                                                  • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                    attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                                                                                    40⤵
                                                                                                                                                    • Sets file to hidden
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    PID:4860
                                                                                                                                                  • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                    attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                                                                                    40⤵
                                                                                                                                                    • Sets file to hidden
                                                                                                                                                    PID:1000
                                                                                                                                                  • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                                                                                    "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                                                                                    40⤵
                                                                                                                                                    • Adds Run key to start application
                                                                                                                                                    • Modifies WinLogon for persistence
                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                    • Modifies registry class
                                                                                                                                                    PID:3988
                                                                                                                                                    • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                      notepad
                                                                                                                                                      41⤵
                                                                                                                                                        PID:4972
                                                                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                        attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                                                                                        41⤵
                                                                                                                                                          PID:1764
                                                                                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                          attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                                                                                          41⤵
                                                                                                                                                          • Sets file to hidden
                                                                                                                                                          PID:2920
                                                                                                                                                        • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                                                                                          "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                                                                                          41⤵
                                                                                                                                                          • Adds Run key to start application
                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                          • Modifies WinLogon for persistence
                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                          • Modifies registry class
                                                                                                                                                          PID:1336
                                                                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                            attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                                                                                            42⤵
                                                                                                                                                            • Sets file to hidden
                                                                                                                                                            • Views/modifies file attributes
                                                                                                                                                            PID:3436
                                                                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                            attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                                                                                            42⤵
                                                                                                                                                            • Drops file in System32 directory
                                                                                                                                                            • Views/modifies file attributes
                                                                                                                                                            PID:3204
                                                                                                                                                          • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                                                                                            "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                                                                                            42⤵
                                                                                                                                                            • Adds Run key to start application
                                                                                                                                                            • Modifies WinLogon for persistence
                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                            • Modifies registry class
                                                                                                                                                            PID:4844
                                                                                                                                                            • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                              attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                                                                                              43⤵
                                                                                                                                                              • Sets file to hidden
                                                                                                                                                              • Views/modifies file attributes
                                                                                                                                                              PID:2028
                                                                                                                                                            • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                              attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                                                                                              43⤵
                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                              PID:2936
                                                                                                                                                            • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                                                                                              "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                                                                                              43⤵
                                                                                                                                                              • Adds Run key to start application
                                                                                                                                                              • Drops file in System32 directory
                                                                                                                                                              • Modifies WinLogon for persistence
                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                              • Modifies registry class
                                                                                                                                                              PID:1548
                                                                                                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                                                                                                44⤵
                                                                                                                                                                • Views/modifies file attributes
                                                                                                                                                                PID:4188
                                                                                                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                                                                                                44⤵
                                                                                                                                                                • Views/modifies file attributes
                                                                                                                                                                PID:708
                                                                                                                                                              • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                                                                                                "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                                                                                                44⤵
                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                • Modifies WinLogon for persistence
                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                • Modifies registry class
                                                                                                                                                                PID:4772
                                                                                                                                                                • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                  notepad
                                                                                                                                                                  45⤵
                                                                                                                                                                  • Adds Run key to start application
                                                                                                                                                                  PID:4020
                                                                                                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                  attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                                                                                                  45⤵
                                                                                                                                                                    PID:696
                                                                                                                                                                  • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                    attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                                                                                                    45⤵
                                                                                                                                                                    • Sets file to hidden
                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                    PID:1704
                                                                                                                                                                  • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                                                                                                    "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                                                                                                    45⤵
                                                                                                                                                                    • Adds Run key to start application
                                                                                                                                                                    • Modifies WinLogon for persistence
                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                    PID:4512
                                                                                                                                                                    • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                      notepad
                                                                                                                                                                      46⤵
                                                                                                                                                                      • Adds Run key to start application
                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                      PID:3992
                                                                                                                                                                    • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                      attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                                                                                                      46⤵
                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                      • Views/modifies file attributes
                                                                                                                                                                      PID:4792
                                                                                                                                                                    • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                      attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                                                                                                      46⤵
                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                      • Views/modifies file attributes
                                                                                                                                                                      PID:1636
                                                                                                                                                                    • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                                                                                                      "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                                                                                                      46⤵
                                                                                                                                                                      • Adds Run key to start application
                                                                                                                                                                      • Modifies WinLogon for persistence
                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                      PID:4104
                                                                                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                        attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                                                                                                        47⤵
                                                                                                                                                                        • Sets file to hidden
                                                                                                                                                                        • Views/modifies file attributes
                                                                                                                                                                        PID:4944
                                                                                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                        attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                                                                                                        47⤵
                                                                                                                                                                        • Sets file to hidden
                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                        • Views/modifies file attributes
                                                                                                                                                                        PID:2428
                                                                                                                                                                      • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                                                                                                        "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                                                                                                        47⤵
                                                                                                                                                                        • Adds Run key to start application
                                                                                                                                                                        • Modifies WinLogon for persistence
                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                        • Modifies registry class
                                                                                                                                                                        PID:2500
                                                                                                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                          attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                                                                                                          48⤵
                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                          PID:1544
                                                                                                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                          attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                                                                                                          48⤵
                                                                                                                                                                          • Sets file to hidden
                                                                                                                                                                          • Views/modifies file attributes
                                                                                                                                                                          PID:1212
                                                                                                                                                                        • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                                                                                                          "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                                                                                                          48⤵
                                                                                                                                                                          • Modifies WinLogon for persistence
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                          PID:3128
                                                                                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                            attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                                                                                                            49⤵
                                                                                                                                                                            • Sets file to hidden
                                                                                                                                                                            PID:4876
                                                                                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                            attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                                                                                                            49⤵
                                                                                                                                                                            • Sets file to hidden
                                                                                                                                                                            • Views/modifies file attributes
                                                                                                                                                                            PID:3784
                                                                                                                                                                          • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                                                                                                            "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                                                                                                            49⤵
                                                                                                                                                                            • Adds Run key to start application
                                                                                                                                                                            • Modifies WinLogon for persistence
                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                            PID:844
                                                                                                                                                                            • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                              attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                                                                                                              50⤵
                                                                                                                                                                              • Sets file to hidden
                                                                                                                                                                              • Views/modifies file attributes
                                                                                                                                                                              PID:4112
                                                                                                                                                                            • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                              attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                                                                                                              50⤵
                                                                                                                                                                              • Sets file to hidden
                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                              PID:4168
                                                                                                                                                                            • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                                                                                                              "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                                                                                                              50⤵
                                                                                                                                                                              • Adds Run key to start application
                                                                                                                                                                              • Modifies WinLogon for persistence
                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                              • Modifies registry class
                                                                                                                                                                              PID:4600
                                                                                                                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                                                                                                                51⤵
                                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                • Views/modifies file attributes
                                                                                                                                                                                PID:2816
                                                                                                                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                                                                                                                51⤵
                                                                                                                                                                                • Sets file to hidden
                                                                                                                                                                                • Views/modifies file attributes
                                                                                                                                                                                PID:2488
                                                                                                                                                                              • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                                                                                                                "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                                                                                                                51⤵
                                                                                                                                                                                • Adds Run key to start application
                                                                                                                                                                                • Modifies WinLogon for persistence
                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                PID:3912
                                                                                                                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                  attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                                                                                                                  52⤵
                                                                                                                                                                                  • Sets file to hidden
                                                                                                                                                                                  PID:5060
                                                                                                                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                  attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                                                                                                                  52⤵
                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                  • Views/modifies file attributes
                                                                                                                                                                                  PID:4908
                                                                                                                                                                                • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                                                                                                                  "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                                                                                                                  52⤵
                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                  • Modifies WinLogon for persistence
                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                                  PID:696
                                                                                                                                                                                  • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                    attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                                                                                                                    53⤵
                                                                                                                                                                                      PID:4008
                                                                                                                                                                                    • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                      attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                                                                                                                      53⤵
                                                                                                                                                                                      • Views/modifies file attributes
                                                                                                                                                                                      PID:2876
                                                                                                                                                                                    • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                                                                                                                      "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                                                                                                                      53⤵
                                                                                                                                                                                      • Adds Run key to start application
                                                                                                                                                                                      • Modifies WinLogon for persistence
                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                      PID:3128
                                                                                                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                        attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                                                                                                                        54⤵
                                                                                                                                                                                        • Sets file to hidden
                                                                                                                                                                                        PID:3516
                                                                                                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                        attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                                                                                                                        54⤵
                                                                                                                                                                                          PID:4112
                                                                                                                                                                                        • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                                                                                                                          "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                                                                                                                          54⤵
                                                                                                                                                                                          • Adds Run key to start application
                                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                                          • Modifies WinLogon for persistence
                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                                          PID:4520
                                                                                                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                            attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                                                                                                                            55⤵
                                                                                                                                                                                            • Sets file to hidden
                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                            • Views/modifies file attributes
                                                                                                                                                                                            PID:4844
                                                                                                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                            attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                                                                                                                            55⤵
                                                                                                                                                                                              PID:2028
                                                                                                                                                                                            • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                                                                                                                              "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                                                                                                                              55⤵
                                                                                                                                                                                              • Adds Run key to start application
                                                                                                                                                                                              • Modifies WinLogon for persistence
                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                              • Modifies registry class
                                                                                                                                                                                              PID:4956
                                                                                                                                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                                                                                                                                56⤵
                                                                                                                                                                                                • Sets file to hidden
                                                                                                                                                                                                PID:988
                                                                                                                                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                                                                                                                                56⤵
                                                                                                                                                                                                • Sets file to hidden
                                                                                                                                                                                                • Views/modifies file attributes
                                                                                                                                                                                                PID:4104
                                                                                                                                                                                              • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                                                                                                                                "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                                                                                                                                56⤵
                                                                                                                                                                                                • Adds Run key to start application
                                                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                                                • Modifies WinLogon for persistence
                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                PID:1336
                                                                                                                                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                  attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                                                                                                                                  57⤵
                                                                                                                                                                                                    PID:3388
                                                                                                                                                                                                  • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                    attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                                                                                                                                    57⤵
                                                                                                                                                                                                      PID:4564
                                                                                                                                                                                                    • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                                                                                                                                      "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                                                                                                                                      57⤵
                                                                                                                                                                                                      • Adds Run key to start application
                                                                                                                                                                                                      • Modifies WinLogon for persistence
                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                      PID:2320
                                                                                                                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                        attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                                                                                                                                        58⤵
                                                                                                                                                                                                        • Views/modifies file attributes
                                                                                                                                                                                                        PID:3668
                                                                                                                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                        attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                                                                                                                                        58⤵
                                                                                                                                                                                                        • Views/modifies file attributes
                                                                                                                                                                                                        PID:4004
                                                                                                                                                                                                      • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                                                                                                                                        "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                                                                                                                                        58⤵
                                                                                                                                                                                                        • Adds Run key to start application
                                                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                                                        • Modifies WinLogon for persistence
                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                        • Modifies registry class
                                                                                                                                                                                                        PID:4772
                                                                                                                                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                          attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                                                                                                                                          59⤵
                                                                                                                                                                                                          • Sets file to hidden
                                                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                                                          • Views/modifies file attributes
                                                                                                                                                                                                          PID:2516
                                                                                                                                                                                                        • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                          attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                                                                                                                                          59⤵
                                                                                                                                                                                                          • Sets file to hidden
                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                          PID:2920
                                                                                                                                                                                                        • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                                                                                                                                          "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                                                                                                                                          59⤵
                                                                                                                                                                                                          • Adds Run key to start application
                                                                                                                                                                                                          • Modifies WinLogon for persistence
                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                                                          PID:2816
                                                                                                                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                            attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                                                                                                                                            60⤵
                                                                                                                                                                                                            • Sets file to hidden
                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                            PID:1480
                                                                                                                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                            attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                                                                                                                                            60⤵
                                                                                                                                                                                                              PID:1896
                                                                                                                                                                                                            • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                                                                                                                                              "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                                                                                                                                              60⤵
                                                                                                                                                                                                              • Adds Run key to start application
                                                                                                                                                                                                              • Modifies WinLogon for persistence
                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                              • Modifies registry class
                                                                                                                                                                                                              PID:1212
                                                                                                                                                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                                                                                                                                                61⤵
                                                                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                                                                PID:1836
                                                                                                                                                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                                                                                                                                                61⤵
                                                                                                                                                                                                                • Sets file to hidden
                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                PID:3316
                                                                                                                                                                                                              • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                                                                                                                                                "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                                                                                                                                                61⤵
                                                                                                                                                                                                                • Adds Run key to start application
                                                                                                                                                                                                                • Modifies WinLogon for persistence
                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                • Modifies registry class
                                                                                                                                                                                                                PID:2736
                                                                                                                                                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                  attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                                                                                                                                                  62⤵
                                                                                                                                                                                                                  • Sets file to hidden
                                                                                                                                                                                                                  • Views/modifies file attributes
                                                                                                                                                                                                                  PID:2876
                                                                                                                                                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                  attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                                                                                                                                                  62⤵
                                                                                                                                                                                                                  • Drops file in System32 directory
                                                                                                                                                                                                                  PID:1648
                                                                                                                                                                                                                • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                                                                                                                                                  "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                                                                                                                                                  62⤵
                                                                                                                                                                                                                  • Adds Run key to start application
                                                                                                                                                                                                                  • Modifies WinLogon for persistence
                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                                                                  PID:1868
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                                                                    notepad
                                                                                                                                                                                                                    63⤵
                                                                                                                                                                                                                    • Adds Run key to start application
                                                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                    PID:4320
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                    attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                                                                                                                                                    63⤵
                                                                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                                                                    PID:2852
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                    attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                                                                                                                                                    63⤵
                                                                                                                                                                                                                    • Sets file to hidden
                                                                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                                                                    PID:4480
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\Windupdt\winupdate.exe
                                                                                                                                                                                                                    "C:\Windows\system32\Windupdt\winupdate.exe"
                                                                                                                                                                                                                    63⤵
                                                                                                                                                                                                                    • Adds Run key to start application
                                                                                                                                                                                                                    • Modifies WinLogon for persistence
                                                                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                                                                    PID:1856
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                      attrib "C:\Windows\SysWOW64\Windupdt\winupdate.exe" +s +h
                                                                                                                                                                                                                      64⤵
                                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                      PID:4992
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                                                                                      attrib "C:\Windows\SysWOW64\Windupdt" +s +h
                                                                                                                                                                                                                      64⤵
                                                                                                                                                                                                                        PID:1020
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                                                                      C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                                                                      63⤵
                                                                                                                                                                                                                        PID:2528
                                                                                                                                                                                              • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                                                C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                                                51⤵
                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                PID:2040
                                                                                                                                                                                    • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                                      C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                                      46⤵
                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                      PID:1072
                                                                                                                                                                                  • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                                    C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                                    45⤵
                                                                                                                                                                                      PID:1348
                                                                                                                                                                            • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                              C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                              41⤵
                                                                                                                                                                                PID:3000
                                                                                                                                                                            • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                              C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                              40⤵
                                                                                                                                                                                PID:4676
                                                                                                                                                                • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                  C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                  33⤵
                                                                                                                                                                    PID:1516
                                                                                                                                                                • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                  C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                  32⤵
                                                                                                                                                                    PID:3104
                                                                                                                                                          • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                            C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                            28⤵
                                                                                                                                                              PID:5088
                                                                                                                                                    • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                      C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                      24⤵
                                                                                                                                                        PID:2680
                                                                                                                                        • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                          C:\Windows\SysWOW64\notepad.exe
                                                                                                                                          17⤵
                                                                                                                                            PID:2640
                                                                                                                            • C:\Windows\SysWOW64\notepad.exe
                                                                                                                              C:\Windows\SysWOW64\notepad.exe
                                                                                                                              10⤵
                                                                                                                                PID:4876
                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5868 /prefetch:2
                                                                                                                2⤵
                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                PID:3660
                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4144 /prefetch:1
                                                                                                                2⤵
                                                                                                                  PID:4528
                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7092 /prefetch:1
                                                                                                                  2⤵
                                                                                                                    PID:1856
                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:1
                                                                                                                    2⤵
                                                                                                                      PID:3732
                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6456 /prefetch:1
                                                                                                                      2⤵
                                                                                                                        PID:3384
                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6820 /prefetch:1
                                                                                                                        2⤵
                                                                                                                          PID:5036
                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:1
                                                                                                                          2⤵
                                                                                                                            PID:1808
                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7140 /prefetch:1
                                                                                                                            2⤵
                                                                                                                              PID:4512
                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7708 /prefetch:8
                                                                                                                              2⤵
                                                                                                                                PID:4348
                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5976 /prefetch:1
                                                                                                                                2⤵
                                                                                                                                  PID:1320
                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=8184 /prefetch:8
                                                                                                                                  2⤵
                                                                                                                                  • Subvert Trust Controls: Mark-of-the-Web Bypass
                                                                                                                                  • NTFS ADS
                                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                                  PID:3160
                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7640 /prefetch:8
                                                                                                                                  2⤵
                                                                                                                                  • Subvert Trust Controls: Mark-of-the-Web Bypass
                                                                                                                                  • NTFS ADS
                                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                                  PID:2692
                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=46 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7884 /prefetch:1
                                                                                                                                  2⤵
                                                                                                                                    PID:3216
                                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7332 /prefetch:8
                                                                                                                                    2⤵
                                                                                                                                      PID:4536
                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5348 /prefetch:8
                                                                                                                                      2⤵
                                                                                                                                      • Subvert Trust Controls: Mark-of-the-Web Bypass
                                                                                                                                      • NTFS ADS
                                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                                      PID:2576
                                                                                                                                    • C:\Users\Admin\Downloads\WinNuke.98.exe
                                                                                                                                      "C:\Users\Admin\Downloads\WinNuke.98.exe"
                                                                                                                                      2⤵
                                                                                                                                      • Executes dropped EXE
                                                                                                                                      PID:1916
                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=50 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7848 /prefetch:1
                                                                                                                                      2⤵
                                                                                                                                        PID:3752
                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7868 /prefetch:8
                                                                                                                                        2⤵
                                                                                                                                          PID:3144
                                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7608 /prefetch:8
                                                                                                                                          2⤵
                                                                                                                                          • Subvert Trust Controls: Mark-of-the-Web Bypass
                                                                                                                                          • NTFS ADS
                                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                                          PID:5100
                                                                                                                                        • C:\Users\Admin\Downloads\MistInfected_newest.exe
                                                                                                                                          "C:\Users\Admin\Downloads\MistInfected_newest.exe"
                                                                                                                                          2⤵
                                                                                                                                          • Drops file in Drivers directory
                                                                                                                                          • Executes dropped EXE
                                                                                                                                          PID:1068
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\MistInfected_newest.exe
                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\MistInfected_newest.exe"
                                                                                                                                            3⤵
                                                                                                                                              PID:2900
                                                                                                                                          • C:\Users\Admin\Downloads\MistInfected_newest.exe
                                                                                                                                            "C:\Users\Admin\Downloads\MistInfected_newest.exe"
                                                                                                                                            2⤵
                                                                                                                                            • Drops file in Drivers directory
                                                                                                                                            PID:1764
                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=54 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3512 /prefetch:1
                                                                                                                                            2⤵
                                                                                                                                              PID:1704
                                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7932 /prefetch:8
                                                                                                                                              2⤵
                                                                                                                                                PID:764
                                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7836 /prefetch:8
                                                                                                                                                2⤵
                                                                                                                                                • Subvert Trust Controls: Mark-of-the-Web Bypass
                                                                                                                                                • NTFS ADS
                                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                PID:128
                                                                                                                                              • C:\Users\Admin\Downloads\NJRat.exe
                                                                                                                                                "C:\Users\Admin\Downloads\NJRat.exe"
                                                                                                                                                2⤵
                                                                                                                                                • Drops startup file
                                                                                                                                                • Adds Run key to start application
                                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                PID:3164
                                                                                                                                                • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                  netsh firewall add allowedprogram "C:\Users\Admin\Downloads\NJRat.exe" "NJRat.exe" ENABLE
                                                                                                                                                  3⤵
                                                                                                                                                  • Modifies Windows Firewall
                                                                                                                                                  • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  PID:5004
                                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=58 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:1
                                                                                                                                                2⤵
                                                                                                                                                  PID:3520
                                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=8016 /prefetch:8
                                                                                                                                                  2⤵
                                                                                                                                                    PID:1756
                                                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3560 /prefetch:8
                                                                                                                                                    2⤵
                                                                                                                                                    • NTFS ADS
                                                                                                                                                    PID:3988
                                                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=62 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8188 /prefetch:1
                                                                                                                                                    2⤵
                                                                                                                                                      PID:3132
                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=8116 /prefetch:8
                                                                                                                                                      2⤵
                                                                                                                                                        PID:2172
                                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4996 /prefetch:8
                                                                                                                                                        2⤵
                                                                                                                                                          PID:1260
                                                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1844,44453880060549651,3236579361325994593,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3460 /prefetch:8
                                                                                                                                                          2⤵
                                                                                                                                                          • Subvert Trust Controls: Mark-of-the-Web Bypass
                                                                                                                                                          • NTFS ADS
                                                                                                                                                          PID:2164
                                                                                                                                                        • C:\Users\Admin\Downloads\ChilledWindows.exe
                                                                                                                                                          "C:\Users\Admin\Downloads\ChilledWindows.exe"
                                                                                                                                                          2⤵
                                                                                                                                                          • Enumerates connected drives
                                                                                                                                                          • Modifies registry class
                                                                                                                                                          PID:3188
                                                                                                                                                      • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                        1⤵
                                                                                                                                                          PID:2188
                                                                                                                                                        • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                          1⤵
                                                                                                                                                            PID:2780
                                                                                                                                                          • C:\Windows\System32\rundll32.exe
                                                                                                                                                            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                                                                                                            1⤵
                                                                                                                                                              PID:3648
                                                                                                                                                            • C:\Windows\system32\AUDIODG.EXE
                                                                                                                                                              C:\Windows\system32\AUDIODG.EXE 0x00000000000004C8 0x00000000000004D4
                                                                                                                                                              1⤵
                                                                                                                                                                PID:3764
                                                                                                                                                              • C:\Users\Admin\Downloads\ChilledWindows.exe
                                                                                                                                                                "C:\Users\Admin\Downloads\ChilledWindows.exe"
                                                                                                                                                                1⤵
                                                                                                                                                                • Enumerates connected drives
                                                                                                                                                                • Modifies registry class
                                                                                                                                                                PID:4168

                                                                                                                                                              Network

                                                                                                                                                              MITRE ATT&CK Enterprise v15

                                                                                                                                                              Replay Monitor

                                                                                                                                                              Loading Replay Monitor...

                                                                                                                                                              Downloads

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                Filesize

                                                                                                                                                                152B

                                                                                                                                                                MD5

                                                                                                                                                                b0177afa818e013394b36a04cb111278

                                                                                                                                                                SHA1

                                                                                                                                                                dbc5c47e7a7df24259d67edf5fbbfa1b1fae3fe5

                                                                                                                                                                SHA256

                                                                                                                                                                ffc2c53bfd37576b435309c750a5b81580a076c83019d34172f6635ff20c2a9d

                                                                                                                                                                SHA512

                                                                                                                                                                d3b9e3a0a99f191edcf33f3658abd3c88afbb12d7b14d3b421b72b74d551b64d2a13d07db94c90b85606198ee6c9e52072e1017f8c8c6144c03acf509793a9db

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                Filesize

                                                                                                                                                                152B

                                                                                                                                                                MD5

                                                                                                                                                                9af507866fb23dace6259791c377531f

                                                                                                                                                                SHA1

                                                                                                                                                                5a5914fc48341ac112bfcd71b946fc0b2619f933

                                                                                                                                                                SHA256

                                                                                                                                                                5fb3ec65ce1e6f47694e56a07c63e3b8af9876d80387a71f1917deae690d069f

                                                                                                                                                                SHA512

                                                                                                                                                                c58c963ecd2c53f0c427f91dc41d9b2a9b766f2e04d7dae5236cb3c769d1f048e4a342ea75e4a690f3a207baa1d3add672160c1f317abfe703fd1d2216b1baf7

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\7522561d-ab3a-4698-ba92-6f1c5154a04b.tmp

                                                                                                                                                                Filesize

                                                                                                                                                                1KB

                                                                                                                                                                MD5

                                                                                                                                                                16d1e832326109ba48d7bf8d8830414f

                                                                                                                                                                SHA1

                                                                                                                                                                8cac37b95839d732ac855ac41c39161fbf33e837

                                                                                                                                                                SHA256

                                                                                                                                                                b0f5eb9924518583cd477bb5db3e5e9ebb63daac3ab72ec35ec1af8de9b4e86b

                                                                                                                                                                SHA512

                                                                                                                                                                1816fd8d9fd2a631da565e7475a5f7d867231df6ef15b87fabd4431f0dc9a95e1e6c5017c48019dcfd345e5da5298e33d3849cf7eb0092a95171793031792fdd

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000002

                                                                                                                                                                Filesize

                                                                                                                                                                62KB

                                                                                                                                                                MD5

                                                                                                                                                                c3c0eb5e044497577bec91b5970f6d30

                                                                                                                                                                SHA1

                                                                                                                                                                d833f81cf21f68d43ba64a6c28892945adc317a6

                                                                                                                                                                SHA256

                                                                                                                                                                eb48be34490ec9c4f9402b882166cd82cd317b51b2a49aae75cdf9ee035035eb

                                                                                                                                                                SHA512

                                                                                                                                                                83d3545a4ed9eed2d25f98c4c9f100ae0ac5e4bc8828dccadee38553b7633bb63222132df8ec09d32eb37d960accb76e7aab5719fc08cc0a4ef07b053f30cf38

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000003

                                                                                                                                                                Filesize

                                                                                                                                                                67KB

                                                                                                                                                                MD5

                                                                                                                                                                a074f116c725add93a8a828fbdbbd56c

                                                                                                                                                                SHA1

                                                                                                                                                                88ca00a085140baeae0fd3072635afe3f841d88f

                                                                                                                                                                SHA256

                                                                                                                                                                4cdcda7d8363be5bc824064259780779e7c046d56399c8a191106f55ce2ed8a6

                                                                                                                                                                SHA512

                                                                                                                                                                43ed55cda35bde93fc93c408908ab126e512c45611a994d7f4e5c85d4f2d90d573066082cb7b8dffce6a24a1f96cd534586646719b214ac7874132163faa5f28

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000004

                                                                                                                                                                Filesize

                                                                                                                                                                41KB

                                                                                                                                                                MD5

                                                                                                                                                                a7ee007fb008c17e73216d0d69e254e8

                                                                                                                                                                SHA1

                                                                                                                                                                160d970e6a8271b0907c50268146a28b5918c05e

                                                                                                                                                                SHA256

                                                                                                                                                                414024b478738b35312a098bc7f911300b14396d34718f78886b5942d9afe346

                                                                                                                                                                SHA512

                                                                                                                                                                669bec67d3fc1932a921dd683e6acfdf462b9063e1726770bae8740d83503a799c2e30030f2aca7ec96df0bfd6d8b7f999f8296ee156533302161eb7c9747602

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000005

                                                                                                                                                                Filesize

                                                                                                                                                                65KB

                                                                                                                                                                MD5

                                                                                                                                                                56d57bc655526551f217536f19195495

                                                                                                                                                                SHA1

                                                                                                                                                                28b430886d1220855a805d78dc5d6414aeee6995

                                                                                                                                                                SHA256

                                                                                                                                                                f12de7e272171cda36389813df4ba68eb2b8b23c58e515391614284e7b03c4d4

                                                                                                                                                                SHA512

                                                                                                                                                                7814c60dc377e400bbbcc2000e48b617e577a21045a0f5c79af163faa0087c6203d9f667e531bbb049c9bd8fb296678e6a5cdcad149498d7f22ffa11236b51cb

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000006

                                                                                                                                                                Filesize

                                                                                                                                                                19KB

                                                                                                                                                                MD5

                                                                                                                                                                2e86a72f4e82614cd4842950d2e0a716

                                                                                                                                                                SHA1

                                                                                                                                                                d7b4ee0c9af735d098bff474632fc2c0113e0b9c

                                                                                                                                                                SHA256

                                                                                                                                                                c1334e604dbbffdf38e9e2f359938569afe25f7150d1c39c293469c1ee4f7b6f

                                                                                                                                                                SHA512

                                                                                                                                                                7a5fd3e3e89c5f8afca33b2d02e5440934e5186b9fa6367436e8d20ad42b211579225e73e3a685e5e763fa3f907fc4632b9425e8bd6d6f07c5c986b6556d47b1

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000008

                                                                                                                                                                Filesize

                                                                                                                                                                88KB

                                                                                                                                                                MD5

                                                                                                                                                                b38fbbd0b5c8e8b4452b33d6f85df7dc

                                                                                                                                                                SHA1

                                                                                                                                                                386ba241790252df01a6a028b3238de2f995a559

                                                                                                                                                                SHA256

                                                                                                                                                                b18b9eb934a5b3b81b16c66ec3ec8e8fecdb3d43550ce050eb2523aabc08b9cd

                                                                                                                                                                SHA512

                                                                                                                                                                546ca9fb302bf28e3a178e798dd6b80c91cba71d0467257b8ed42e4f845aa6ecb858f718aac1e0865b791d4ecf41f1239081847c75c6fb3e9afd242d3704ad16

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00000a

                                                                                                                                                                Filesize

                                                                                                                                                                1.2MB

                                                                                                                                                                MD5

                                                                                                                                                                9f8f80ca4d9435d66dd761fbb0753642

                                                                                                                                                                SHA1

                                                                                                                                                                5f187d02303fd9044b9e7c74e0c02fe8e6a646b7

                                                                                                                                                                SHA256

                                                                                                                                                                ab481b8b19b3336deda1b9ad4680cce4958152c9f9daa60c7bd8eb6786887359

                                                                                                                                                                SHA512

                                                                                                                                                                9c0de8e5bf16f096bf781189d813eeb52c3c8ec73fc791de10a8781e9942de06ed30ff5021ab7385c98686330049e3e610adc3e484e12ef807eec58607cfae63

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000025

                                                                                                                                                                Filesize

                                                                                                                                                                756KB

                                                                                                                                                                MD5

                                                                                                                                                                c7dcd585b7e8b046f209052bcd6dd84b

                                                                                                                                                                SHA1

                                                                                                                                                                604dcfae9eed4f65c80a4a39454db409291e08fa

                                                                                                                                                                SHA256

                                                                                                                                                                0e8336ed51fe4551ced7d9aa5ce2dde945df8a0cc4e7c60199c24dd1cf7ccd48

                                                                                                                                                                SHA512

                                                                                                                                                                c5ba102b12d2c685312d7dc8d58d98891b73243f56a8491ea7c41c2edaaad44ad90b8bc0748dbd8c84e92e9ae9bbd0b0157265ebe35fb9b63668c57d0e1ed5f2

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00002a

                                                                                                                                                                Filesize

                                                                                                                                                                4.4MB

                                                                                                                                                                MD5

                                                                                                                                                                6a4853cd0584dc90067e15afb43c4962

                                                                                                                                                                SHA1

                                                                                                                                                                ae59bbb123e98dc8379d08887f83d7e52b1b47fc

                                                                                                                                                                SHA256

                                                                                                                                                                ccb9502bf8ba5becf8b758ca04a5625c30b79e2d10d2677cc43ae4253e1288ec

                                                                                                                                                                SHA512

                                                                                                                                                                feb223e0de9bd64e32dc4f3227e175b58196b5e614bca8c2df0bbca2442a564e39d66bcd465154149dc7ebbd3e1ca644ed09d9a9174b52236c76e7388cb9d996

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                Filesize

                                                                                                                                                                4KB

                                                                                                                                                                MD5

                                                                                                                                                                a07a1f72c1b4a4bd45ac9f86d53e6e1f

                                                                                                                                                                SHA1

                                                                                                                                                                9e66f29f0dc292f65cb8ad0d432c536355bbfb8c

                                                                                                                                                                SHA256

                                                                                                                                                                832a9db0aa7949326c3798debb501269b0040706958117edae129ef63fb84826

                                                                                                                                                                SHA512

                                                                                                                                                                97c1fb52a41b124b6e90f2a4d1ddc800a1019e48e7a2dad3a807753419dcdd1df26591ec1f54d13a62e9778c9f5166af294fc78c57c16d192bca72a894fce14b

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                Filesize

                                                                                                                                                                879B

                                                                                                                                                                MD5

                                                                                                                                                                0b8e2c976fd7c390a726194c93d7a73b

                                                                                                                                                                SHA1

                                                                                                                                                                b85084baae50f5a74aba27780544ad2f50fe4db7

                                                                                                                                                                SHA256

                                                                                                                                                                b208a52e952f3421bacad1845d2711bf0b01866484afe3167e4a2897ea467545

                                                                                                                                                                SHA512

                                                                                                                                                                bb93447c7883c586e7bc3c8430cef17a26716e6eeca6c276024daf749a85540d9cd58022cba0ad6106966d53a09924521acab78b48dbb149eb50864e9846f10d

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                Filesize

                                                                                                                                                                1KB

                                                                                                                                                                MD5

                                                                                                                                                                6845f96f0d33ae3e63c6aa87dcf80357

                                                                                                                                                                SHA1

                                                                                                                                                                37c152927371a8f13fec6aae43f6396ae625f897

                                                                                                                                                                SHA256

                                                                                                                                                                6aad0aaac605b54b5058897c672b3097b3832b888d8b9e7204653a00ed3b6346

                                                                                                                                                                SHA512

                                                                                                                                                                90637183c307309951a4e949b9a7c3180a6b4ceacd2e84af482641e036fb1896dad48321e9485d96219abecfe059dafe909ab9c9f0053f4161006d8ef5179063

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                Filesize

                                                                                                                                                                1KB

                                                                                                                                                                MD5

                                                                                                                                                                4fa27aaae8c8406eb744f65967f81020

                                                                                                                                                                SHA1

                                                                                                                                                                246184265409deef13b0ee601fec1535700be423

                                                                                                                                                                SHA256

                                                                                                                                                                b4c87e5cd35e67f9b873868020d2a9a7314246269698662731a3f8cdd1cca210

                                                                                                                                                                SHA512

                                                                                                                                                                17082c386b1d36fdf4b747235c5c89ef9f8e12e1c63c7f560592e826faaa506e9e4989e9620578b2fc6a2007056d0210b23fd7cf063bc29d9b3106d9496fed17

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                Filesize

                                                                                                                                                                1KB

                                                                                                                                                                MD5

                                                                                                                                                                ae71a7fafeb2aefe02beb4434513ccca

                                                                                                                                                                SHA1

                                                                                                                                                                f229a294fa0edf4b29ed7526aa41d7be9cdc9581

                                                                                                                                                                SHA256

                                                                                                                                                                51618b79371fabb6a3c9931ca56642b7ff2b810f503538be5f1cd318ab8952f2

                                                                                                                                                                SHA512

                                                                                                                                                                65a95e5f34c4142ed718a2ad7c270c43cf8df10f6e2669754c99aba5bee3260cd3bfbad619b75a811856e1e0acf8206b32e047edb2dfad83022e5ca583172e6e

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                Filesize

                                                                                                                                                                6KB

                                                                                                                                                                MD5

                                                                                                                                                                9d8554fde6af1e1c7e510dce684e2d0b

                                                                                                                                                                SHA1

                                                                                                                                                                e50a198accb2b44cdfc30a4bdb7c6c8fd1fab010

                                                                                                                                                                SHA256

                                                                                                                                                                89ad860122a1f941aa1bee293e2d57797f9c2d388633b1978f960895837071b3

                                                                                                                                                                SHA512

                                                                                                                                                                e7e781cf9588c5d00e6f83e1df03a5615b2b068500984ba9e3e043bcef97d33122b6098bb137982c38a702cc5ee2f720169c48a4847482a5064b902a9e6129b1

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                Filesize

                                                                                                                                                                6KB

                                                                                                                                                                MD5

                                                                                                                                                                70775b29a44e4ac2779fb2f096bc5cc5

                                                                                                                                                                SHA1

                                                                                                                                                                80bf1e6d9c42cec1fd1e7b79104a2b05735da8a5

                                                                                                                                                                SHA256

                                                                                                                                                                48868d622676afee9405873c9d1228e5b5c83d494382013195581e24731631d5

                                                                                                                                                                SHA512

                                                                                                                                                                c182887f5384766a75cbfdc57ed5978005f021379c757994fbcafbdbfbf89c7f4935696be790b730476400cf745c487af2722c61fd6438e14bbd2024ad3ea452

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                Filesize

                                                                                                                                                                6KB

                                                                                                                                                                MD5

                                                                                                                                                                e870f668582cfbf5a80739f3d990b8f7

                                                                                                                                                                SHA1

                                                                                                                                                                c1c24ebba61d6fcc9bd5b3e4e87b8332b5c69361

                                                                                                                                                                SHA256

                                                                                                                                                                0b655ecd42bfc3e771677115a195fe9b1ae40a65a236fd8986416af829d03f4e

                                                                                                                                                                SHA512

                                                                                                                                                                43560ba1c938b762b4b929f85e346fe1d8e5b18c56f69b0404f8f55f388358768cb1ac283847b831599d8f9fa55ad780058dd499ce9885f4c5939a786ee7b97c

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                Filesize

                                                                                                                                                                5KB

                                                                                                                                                                MD5

                                                                                                                                                                760764d1fefa8b402eb26ce7d357d3e1

                                                                                                                                                                SHA1

                                                                                                                                                                b5f9d73876aba56c278d07cd32fb939783b8e4ac

                                                                                                                                                                SHA256

                                                                                                                                                                e19bcffaf610a23ab1d69d2a73cf9435a1eb133f36d920aea2535315f886d8dd

                                                                                                                                                                SHA512

                                                                                                                                                                5cbc5dc2b73772c517e2cb214e318c00125d89586119e8d72eae692b52f6dd92ff072d69d4b3d0eb906e17bd8814a4b57214e4611e61bf60ec92c1bfa1ff4b0e

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                Filesize

                                                                                                                                                                6KB

                                                                                                                                                                MD5

                                                                                                                                                                d5546df254c4b44392f58482b854ada0

                                                                                                                                                                SHA1

                                                                                                                                                                3671e7c4db5e74938e80e16fb3f88beca7b73e26

                                                                                                                                                                SHA256

                                                                                                                                                                84cc9a44466f4efab0b113fad6051ff6988abad3b9b00472ebfddcfdf44e10c8

                                                                                                                                                                SHA512

                                                                                                                                                                214a7352011dd4f9309c15f6cb54f8758af309818e193610b01a5448360dc8f4a766d4fc412be56ac2e943dd0be69449c84c0210ed80ca7a33767d655af55f25

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                Filesize

                                                                                                                                                                1KB

                                                                                                                                                                MD5

                                                                                                                                                                ce6bc313b7805e0ed75a4c31645818ad

                                                                                                                                                                SHA1

                                                                                                                                                                c3b7ec0cb06a5b0d50fd63f006d5ec1353569221

                                                                                                                                                                SHA256

                                                                                                                                                                c841c73b6b018c02dec49db8b185eeaa89b93cb07f733f0d9084a5b959c9900a

                                                                                                                                                                SHA512

                                                                                                                                                                dc81436f3e90795238d756e6113953ed284534564b605f3acf072940db201fcfa535559cd713f5154be2890590423448f9fa8f792965b41529949c5c014e02a4

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                Filesize

                                                                                                                                                                1KB

                                                                                                                                                                MD5

                                                                                                                                                                d2467df5b5352370ce4397bb843bd1b3

                                                                                                                                                                SHA1

                                                                                                                                                                b4ba9ea1a79153d0395de5a91cbdd32ed42eee9e

                                                                                                                                                                SHA256

                                                                                                                                                                12113af8de104653c3f008ce978b1ec1cd05da3e7d70ef6508e44c1326e6df21

                                                                                                                                                                SHA512

                                                                                                                                                                17c2264d2c184a623bf0c07b60992db343935b913a408b780f8bbbad5782ab1c81020d12f4e182ad78c5ad9c3bc4b81a92d054c57ff573831e762070dfda2152

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                Filesize

                                                                                                                                                                1KB

                                                                                                                                                                MD5

                                                                                                                                                                4a9d5ba00a22e295f47129d7108232e2

                                                                                                                                                                SHA1

                                                                                                                                                                cd3b8940a0e9bf71a8b85dea31bedca002ab26e3

                                                                                                                                                                SHA256

                                                                                                                                                                699ee8d047ae8363f36dd0fbc6ea3e8df704bffbe521a372c7f6aef47df6d13f

                                                                                                                                                                SHA512

                                                                                                                                                                4d88954cd32f8a4e166d8e08a8609f2a5eacca76da62245922a3eea4aa74dff896378c7f9cef6c9ee8ad8b3f11be06129c54f4be4ef15511fbd297bd1c4987ce

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                Filesize

                                                                                                                                                                1KB

                                                                                                                                                                MD5

                                                                                                                                                                fe09befd25bbdb71555e71bf2260a080

                                                                                                                                                                SHA1

                                                                                                                                                                7b9914688935970c9b9c54e7ba3dfe6a79b5f13f

                                                                                                                                                                SHA256

                                                                                                                                                                f2abd8aee83c4f42f2eec908dc433741cf142fb72eb800c370c34fa733d94f96

                                                                                                                                                                SHA512

                                                                                                                                                                5f12906530001fc0015a2859002ca170663cc9c27841c9c271c02ec6950a675066506bcdf283e23edf4c59a30d37a262bcc525aaa69fc2f04bb8ccc034b56a5b

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                Filesize

                                                                                                                                                                1KB

                                                                                                                                                                MD5

                                                                                                                                                                8a8771537bd1a518469120e99b78255a

                                                                                                                                                                SHA1

                                                                                                                                                                27921a3c945e70fa66d5695468e0410ff9286243

                                                                                                                                                                SHA256

                                                                                                                                                                3f8a065167ae33a10039b80d155c6fe22cbe38f0ffbc55f6e04145d42133759a

                                                                                                                                                                SHA512

                                                                                                                                                                733a1520208fbff8422603f90a67a1efa8080c8f8011ff446fa13d7b2a16c9d29b1e2974ae13f7e935ee97dfb6c2f99c38648ea956d5af324df41f51f1d2a2c1

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                Filesize

                                                                                                                                                                1KB

                                                                                                                                                                MD5

                                                                                                                                                                49f9dca8fa44ccbb439ae30671d21942

                                                                                                                                                                SHA1

                                                                                                                                                                c1ef948a9596d5b7118ae4ad8ebdee9b69973e7b

                                                                                                                                                                SHA256

                                                                                                                                                                f2d38d5292d0b3a90922836a5fc48bd4fbf1ad4b94dd1b4bcc5e9d9304516a95

                                                                                                                                                                SHA512

                                                                                                                                                                ef77a1a0f80ab8d7039722c691b4e43faf60a8f860a228552fbaa9ce7ec0fb97e1615773b3b59d82fcc20d0fdfd5aec79bfe414708c7467a6f5524b5deeade40

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                Filesize

                                                                                                                                                                1KB

                                                                                                                                                                MD5

                                                                                                                                                                2512d5cf9b1978049267c2a097b97de7

                                                                                                                                                                SHA1

                                                                                                                                                                832d81630f353b38379868927f3617c33a7cbba4

                                                                                                                                                                SHA256

                                                                                                                                                                4471a1a922d03d1d88393569d374fddbc4ebcce8e6b49750ffc5b9128212a583

                                                                                                                                                                SHA512

                                                                                                                                                                94e6ebdf00bd613653b18b3ee09e8a801e5b0422a2712ca848bfbc099e1ecc7939ec4f73eee821e1a32553e36e7d1a07908261aeb614e4b56fe0a79ece2cd6a1

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                Filesize

                                                                                                                                                                1KB

                                                                                                                                                                MD5

                                                                                                                                                                bde9af0fe26d80c21e5593e1298bce28

                                                                                                                                                                SHA1

                                                                                                                                                                1e5c0ff58d98b19e7fd4b60ec35cef88f0c0587e

                                                                                                                                                                SHA256

                                                                                                                                                                ddf6afc9d690de5663a834a5d730743bd019aebb4103bcd155a64ee1e371355c

                                                                                                                                                                SHA512

                                                                                                                                                                aa605f4424e20372dfac09e5dda85572e03e6e6beea1c80df52d886c557a8b7970fe31d3135c7447590af7fb5f4bbf4613cd569c2902ad7d90de84e85e52e9ce

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                Filesize

                                                                                                                                                                1KB

                                                                                                                                                                MD5

                                                                                                                                                                be3349591097dff38f76e87bf2fa47ce

                                                                                                                                                                SHA1

                                                                                                                                                                e135661681e81031cd55d09cdbd16d89d472b5c7

                                                                                                                                                                SHA256

                                                                                                                                                                4cb7ca5947559619cafff7ed95defc8a5b73bce5c4078971c20d58ad0cd60fcd

                                                                                                                                                                SHA512

                                                                                                                                                                175f7a4655b05145cde0fcede87cc4791e6a71675c99d6955494a191fb31c794b010e3f3a34848fee2fb20396a3b10e8c228e39f5809e344d06b2e320774ae3a

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                Filesize

                                                                                                                                                                1KB

                                                                                                                                                                MD5

                                                                                                                                                                d7b7c8b177dea0b411d438fb1e060aa8

                                                                                                                                                                SHA1

                                                                                                                                                                bbde6321ff8ace6c7d61c649fa66faac64c04c3d

                                                                                                                                                                SHA256

                                                                                                                                                                ad91f9cebe6070d1ea4d612610494aaee3a9e10176db672b1c389aa471cff74a

                                                                                                                                                                SHA512

                                                                                                                                                                ad3ca79ee4b5e864d63ef2f3cc1f44224e59d0dd17e122d647c9188ab69e95e5cc535f9996ddb184255434fdae12bf6bcedbaae183351d14e301488c168926d9

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                Filesize

                                                                                                                                                                1KB

                                                                                                                                                                MD5

                                                                                                                                                                c2990e15114cee1784512e9943a34126

                                                                                                                                                                SHA1

                                                                                                                                                                7abfc4b678c17ef5bb17292ba2d6a3cab23aea66

                                                                                                                                                                SHA256

                                                                                                                                                                9b168e6aa4c6dcefb29925fc65f76e0025ae10d0ac3430456c331ae3ef2cf943

                                                                                                                                                                SHA512

                                                                                                                                                                33a23c52af3e780d5cf6fde80b5699d50b145790a72ff8b4423b7d1f70261e7d02bc7045d53e9b430a5ff66f0a93d0e9bcf19c7a5a618f716dcc5ecfaf0aae7f

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                Filesize

                                                                                                                                                                1KB

                                                                                                                                                                MD5

                                                                                                                                                                a1b7ddeaed45c855b0e28e81b9f6cc90

                                                                                                                                                                SHA1

                                                                                                                                                                efa58bdf47aed4b8ea910c51b933a44b4b95ed9a

                                                                                                                                                                SHA256

                                                                                                                                                                2918f508325a08d0b506eb8c58c25eeb9c73ae614038b7cd4e4c20c451bb4936

                                                                                                                                                                SHA512

                                                                                                                                                                ffa435ea88d2accb45f7b3aeaff30f40288d3c563e58e069fe1f5fe7ece25f0d883d8086bdf60d4445b2fe84e96553930aafeea3824ae2ec59f8310a362d7884

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                Filesize

                                                                                                                                                                1KB

                                                                                                                                                                MD5

                                                                                                                                                                53877903619ddc81152547b5b39db7b3

                                                                                                                                                                SHA1

                                                                                                                                                                baf4f66e743d1f26494c890f6c8ead43427e6fba

                                                                                                                                                                SHA256

                                                                                                                                                                cde356c65c5a896cf7da8fe925991251d6664283139a0b7608661cbc178acb6d

                                                                                                                                                                SHA512

                                                                                                                                                                d0d6cc2c462c3ca811a3d851be28a45341b0e49b613d8c7c9efff8b86024de7324651bd4e4dac2c0a67b4bdbb152e414b0e67d159b2188d666ba3c68082b9d5f

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                Filesize

                                                                                                                                                                1KB

                                                                                                                                                                MD5

                                                                                                                                                                187ffcc3ed04643f3c3bf589ce3fbf0c

                                                                                                                                                                SHA1

                                                                                                                                                                0c0305720eb6cc8d19672d00669c5f03721539f5

                                                                                                                                                                SHA256

                                                                                                                                                                23ad170f2f161baa81e467bb3cb26047039cdc2dd3b587b311094e573d0bf1f2

                                                                                                                                                                SHA512

                                                                                                                                                                90f3a6d22989d2b4b0f3220194dcd39d790635ba7001829d2c23c650cdb0afc2524b7dffebf6ddf8c0f06d3370309b22e728bb2e8ea979da4de0d2dd8b96ee52

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe5848fb.TMP

                                                                                                                                                                Filesize

                                                                                                                                                                534B

                                                                                                                                                                MD5

                                                                                                                                                                25c4ccb244e4cbbef9f81c1a0df4b0ab

                                                                                                                                                                SHA1

                                                                                                                                                                d37374c0f4686afc0ce1c91c17780a09d8c23956

                                                                                                                                                                SHA256

                                                                                                                                                                219f28eb43c986a3f59f9b61f3fe1c911890c305e4904fb0c79ed89968a79849

                                                                                                                                                                SHA512

                                                                                                                                                                269190258594fb6378a171f63e48c8ab1a48e0fb5169f63bc1315781aae185f6842f4a2844bc935c74c226d29d4f76e18e45f44048115246a7be94289fc69016

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                                Filesize

                                                                                                                                                                16B

                                                                                                                                                                MD5

                                                                                                                                                                206702161f94c5cd39fadd03f4014d98

                                                                                                                                                                SHA1

                                                                                                                                                                bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                                                                                                                                SHA256

                                                                                                                                                                1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                                                                                                                                SHA512

                                                                                                                                                                0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                                Filesize

                                                                                                                                                                16B

                                                                                                                                                                MD5

                                                                                                                                                                46295cac801e5d4857d09837238a6394

                                                                                                                                                                SHA1

                                                                                                                                                                44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                                                                                                SHA256

                                                                                                                                                                0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                                                                                                SHA512

                                                                                                                                                                8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                Filesize

                                                                                                                                                                11KB

                                                                                                                                                                MD5

                                                                                                                                                                269041fd0a89d1b56d3c6b362cbe0ed9

                                                                                                                                                                SHA1

                                                                                                                                                                a86f3e5632e69b4d7a189e6b6547eb6a8f41222c

                                                                                                                                                                SHA256

                                                                                                                                                                b8b15f700229782e7e0ec650a9ffcfd22bb8f3dc93c54d2a04fa3547f0e582ef

                                                                                                                                                                SHA512

                                                                                                                                                                6b7e999c5a5b9a4661fad5c800ee9ed8f251f490aac34aa019bf2b62fc9fb16cf7a48ef003a46641cec2c250c010779d3692e6586b0cbf30783d029b45142c01

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                Filesize

                                                                                                                                                                11KB

                                                                                                                                                                MD5

                                                                                                                                                                7d8edbcc0ed60edfce7b42501f82511b

                                                                                                                                                                SHA1

                                                                                                                                                                c4d9e700d482eed6405eb9d4cb53394057dc45f6

                                                                                                                                                                SHA256

                                                                                                                                                                7d339e4232f377ae2f815dee505336e5fe8cd6adb54546a68c986976ec328c4b

                                                                                                                                                                SHA512

                                                                                                                                                                2e13b33056cf2a398d5b61d2aad70662619de844c05d6ad6a9be55366404b2f738d4e2f9c0199eff554f8e865d7cb17266f6c8312d8192feaa110a10baf0af1e

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                Filesize

                                                                                                                                                                11KB

                                                                                                                                                                MD5

                                                                                                                                                                d47c330a91a026d15b386e8a45bc4b57

                                                                                                                                                                SHA1

                                                                                                                                                                85b299fb18b1914fed7ebf7a9d2852022af7fd82

                                                                                                                                                                SHA256

                                                                                                                                                                d4090b6b742a16ea7cbd7bb0ef2ce0adf14e2dc58e6f6dd3c179b9c7c6e8f6be

                                                                                                                                                                SHA512

                                                                                                                                                                b3e16049fe8eed75e61d947b8f88f76a2d76795defb0db2b296e8abcca511960e46d3256f809eed4ad87271728888d165ce0988e303869d9c28f9417f27c6782

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                Filesize

                                                                                                                                                                11KB

                                                                                                                                                                MD5

                                                                                                                                                                24a0fad0169f2a292ab85cccda7dd9be

                                                                                                                                                                SHA1

                                                                                                                                                                1487c66a6bf2c7ae2a01b8fcf31fa7683ee89e23

                                                                                                                                                                SHA256

                                                                                                                                                                a93e1f9094ef5d3931e45e95f66196502721dd60d1bf1af1972989079f86cd5d

                                                                                                                                                                SHA512

                                                                                                                                                                3f511f39246d12d651faa19c7c864e235ca55e0f61362f88b5fcfd4098f1fbe3ce09babf4310576ea27a4f9e7f65326462b3818bb49f43e3d29f756581134313

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                Filesize

                                                                                                                                                                11KB

                                                                                                                                                                MD5

                                                                                                                                                                d91b3eed19951bc5c2984a108c9f4962

                                                                                                                                                                SHA1

                                                                                                                                                                4858520af7896b579e15a36a5f22d74f7078c228

                                                                                                                                                                SHA256

                                                                                                                                                                3b2b3db51e42389722277b10bf1ddee519c09be8f8589439a524a1dd23e83bc3

                                                                                                                                                                SHA512

                                                                                                                                                                535d804e2b68ecf992ed0721d6a0aea51bb4266e342757403d5716bfae56d516d752250f2becc76bcb3602836d9c62c7c9d62e5bd93a60e165a5f51f2a3991e4

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                Filesize

                                                                                                                                                                11KB

                                                                                                                                                                MD5

                                                                                                                                                                4b08d0409110d1076cba50f2ba6de8a3

                                                                                                                                                                SHA1

                                                                                                                                                                f5a6f4548aa428dd7726162dde1e4cf08cba29ec

                                                                                                                                                                SHA256

                                                                                                                                                                bff134a711964c18e87d99e2e444ca85c57e6d7ef12c14e95e79ed0651faf400

                                                                                                                                                                SHA512

                                                                                                                                                                a0d9f0cec14cdd12f2466caa21169145b3a1cd394f63158751bf687596a3905e77122303b942e55a50516fbe9ad35ab217b79f2e462f8fba81ca7cbe17b5eece

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

                                                                                                                                                                Filesize

                                                                                                                                                                896KB

                                                                                                                                                                MD5

                                                                                                                                                                c48c031107b847635a5e67fda91b4213

                                                                                                                                                                SHA1

                                                                                                                                                                31a1c16a92d03f2f21a9bc01c4d3f010aed97a25

                                                                                                                                                                SHA256

                                                                                                                                                                6d3af43e0fae1bdac5037930ab875b73ef2ccddc55e66cd8a51a243250b83b08

                                                                                                                                                                SHA512

                                                                                                                                                                65dea6a6831252d2f65bbaddf9e41d5d63389997b976fefc64ac3e30e60b5f6ac8e00f0e6527b145c418ec30727d547a456e16e6c38c42a9da369c00697478fa

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML.bak

                                                                                                                                                                Filesize

                                                                                                                                                                9KB

                                                                                                                                                                MD5

                                                                                                                                                                7050d5ae8acfbe560fa11073fef8185d

                                                                                                                                                                SHA1

                                                                                                                                                                5bc38e77ff06785fe0aec5a345c4ccd15752560e

                                                                                                                                                                SHA256

                                                                                                                                                                cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

                                                                                                                                                                SHA512

                                                                                                                                                                a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\is-AAGR9.tmp\free-vpn-3.2-installer_96-miv1.tmp

                                                                                                                                                                Filesize

                                                                                                                                                                3.1MB

                                                                                                                                                                MD5

                                                                                                                                                                db28fcc0fffc6630fe26b980989bcef7

                                                                                                                                                                SHA1

                                                                                                                                                                5df0b8072c9d6e5eb5f60300ff021774c03fed4b

                                                                                                                                                                SHA256

                                                                                                                                                                03f35384c001acb1a19371cfc66afd98507b1ad93b4b20cb530679c64b2a8a86

                                                                                                                                                                SHA512

                                                                                                                                                                e323d28d5e7b8b37a545f52cf7310edfdf6a3c5a3ce0d7e2a2e37ecfc5b72de9c39fb9db177d5420dd16503e4d39a04b59d55f0d84132aa6764349444859ffc4

                                                                                                                                                              • C:\Users\Admin\Downloads\Adwind.exe:Zone.Identifier

                                                                                                                                                                Filesize

                                                                                                                                                                55B

                                                                                                                                                                MD5

                                                                                                                                                                0f98a5550abe0fb880568b1480c96a1c

                                                                                                                                                                SHA1

                                                                                                                                                                d2ce9f7057b201d31f79f3aee2225d89f36be07d

                                                                                                                                                                SHA256

                                                                                                                                                                2dfb5f4b33e4cf8237b732c02b1f2b1192ffe4b83114bcf821f489bbf48c6aa1

                                                                                                                                                                SHA512

                                                                                                                                                                dbc1150d831950684ab37407defac0177b7583da0fe13ee8f8eeb65e8b05d23b357722246888189b4681b97507a4262ece96a1c458c4427a9a41d8ea8d11a2f6

                                                                                                                                                              • C:\Users\Admin\Downloads\Blackkomet.exe:Zone.Identifier

                                                                                                                                                                Filesize

                                                                                                                                                                26B

                                                                                                                                                                MD5

                                                                                                                                                                fbccf14d504b7b2dbcb5a5bda75bd93b

                                                                                                                                                                SHA1

                                                                                                                                                                d59fc84cdd5217c6cf74785703655f78da6b582b

                                                                                                                                                                SHA256

                                                                                                                                                                eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

                                                                                                                                                                SHA512

                                                                                                                                                                aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

                                                                                                                                                              • C:\Users\Admin\Downloads\Unconfirmed 137406.crdownload

                                                                                                                                                                Filesize

                                                                                                                                                                32KB

                                                                                                                                                                MD5

                                                                                                                                                                eb9324121994e5e41f1738b5af8944b1

                                                                                                                                                                SHA1

                                                                                                                                                                aa63c521b64602fa9c3a73dadd412fdaf181b690

                                                                                                                                                                SHA256

                                                                                                                                                                2f1f93ede80502d153e301baf9b7f68e7c7a9344cfa90cfae396aac17e81ce5a

                                                                                                                                                                SHA512

                                                                                                                                                                7f7a702ddec8d94cb2177b4736d94ec53e575be3dd2d610410cb3154ba9ad2936c98e0e72ed7ab5ebbcbe0329be0d9b20a3bcd84670a6d1c8d7e0a9a3056edd2

                                                                                                                                                              • C:\Users\Admin\Downloads\Unconfirmed 310841.crdownload

                                                                                                                                                                Filesize

                                                                                                                                                                31KB

                                                                                                                                                                MD5

                                                                                                                                                                29a37b6532a7acefa7580b826f23f6dd

                                                                                                                                                                SHA1

                                                                                                                                                                a0f4f3a1c5e159b6e2dadaa6615c5e4eb762479f

                                                                                                                                                                SHA256

                                                                                                                                                                7a84dd83f4f00cf0723b76a6a56587bdce6d57bd8024cc9c55565a442806cf69

                                                                                                                                                                SHA512

                                                                                                                                                                a54e2b097ffdaa51d49339bd7d15d6e8770b02603e3c864a13e5945322e28eb2eebc32680c6ddddbad1d9a3001aa02e944b6cef86d4a260db7e4b50f67ac9818

                                                                                                                                                              • C:\Users\Admin\Downloads\Unconfirmed 546466.crdownload

                                                                                                                                                                Filesize

                                                                                                                                                                17KB

                                                                                                                                                                MD5

                                                                                                                                                                451112d955af4fe3c0d00f303d811d20

                                                                                                                                                                SHA1

                                                                                                                                                                1619c35078ba891091de6444099a69ef364e0c10

                                                                                                                                                                SHA256

                                                                                                                                                                0d57a706d4e10cca3aed49b341a651f29046f5ef1328878d616be93c3b4cbce9

                                                                                                                                                                SHA512

                                                                                                                                                                35357d2c4b8229ef9927fa37d85e22f3ae26606f577c4c4655b2126f0ecea4c69dae03043927207ca426cc3cd54fc3e72124369418932e04733a368c9316cf87

                                                                                                                                                              • C:\Users\Admin\Downloads\Unconfirmed 601589.crdownload

                                                                                                                                                                Filesize

                                                                                                                                                                22KB

                                                                                                                                                                MD5

                                                                                                                                                                1e527b9018e98351782da198e9b030dc

                                                                                                                                                                SHA1

                                                                                                                                                                647122775c704548a460d6d4a2e2ff0f2390a506

                                                                                                                                                                SHA256

                                                                                                                                                                5f7471c215b433f1b28dd4b328b99362099b6df7cb9e5c1d86a756388e0c7aeb

                                                                                                                                                                SHA512

                                                                                                                                                                4a11c811f30016218075d43a9f983fa7a484a06f22d625b1bd2d92b4cfabbfb142945ca0a9ca1cf91391a3e73c154f6121140d2f1d42aa35ad7f10817534a21b

                                                                                                                                                              • C:\Users\Admin\Downloads\Unconfirmed 666824.crdownload

                                                                                                                                                                Filesize

                                                                                                                                                                5KB

                                                                                                                                                                MD5

                                                                                                                                                                fe537a3346590c04d81d357e3c4be6e8

                                                                                                                                                                SHA1

                                                                                                                                                                b1285f1d8618292e17e490857d1bdf0a79104837

                                                                                                                                                                SHA256

                                                                                                                                                                bbc572cced7c94d63a7208f4aba4ed20d1350bef153b099035a86c95c8d96d4a

                                                                                                                                                                SHA512

                                                                                                                                                                50a5c1ad99ee9f3a540cb30e87ebfdf7561f0a0ee35b3d06c394fa2bad06ca6088a04848ddcb25f449b3c98b89a91d1ba5859f1ed6737119b606968be250c8ce

                                                                                                                                                              • C:\Users\Admin\Downloads\Unconfirmed 937032.crdownload

                                                                                                                                                                Filesize

                                                                                                                                                                2KB

                                                                                                                                                                MD5

                                                                                                                                                                a56d479405b23976f162f3a4a74e48aa

                                                                                                                                                                SHA1

                                                                                                                                                                f4f433b3f56315e1d469148bdfd835469526262f

                                                                                                                                                                SHA256

                                                                                                                                                                17d81134a5957fb758b9d69a90b033477a991c8b0f107d9864dc790ca37e6a23

                                                                                                                                                                SHA512

                                                                                                                                                                f5594cde50ca5235f7759c9350d4054d7a61b5e61a197dffc04eb8cdef368572e99d212dd406ad296484b5f0f880bdc5ec9e155781101d15083c1564738a900a

                                                                                                                                                              • C:\Users\Admin\Downloads\Unconfirmed 937032.crdownload:SmartScreen

                                                                                                                                                                Filesize

                                                                                                                                                                7B

                                                                                                                                                                MD5

                                                                                                                                                                4047530ecbc0170039e76fe1657bdb01

                                                                                                                                                                SHA1

                                                                                                                                                                32db7d5e662ebccdd1d71de285f907e3a1c68ac5

                                                                                                                                                                SHA256

                                                                                                                                                                82254025d1b98d60044d3aeb7c56eed7c61c07c3e30534d6e05dab9d6c326750

                                                                                                                                                                SHA512

                                                                                                                                                                8f002af3f4ed2b3dfb4ed8273318d160152da50ee4842c9f5d9915f50a3e643952494699c4258e6af993dc6e1695d0dc3db6d23f4d93c26b0bc6a20f4b4f336e

                                                                                                                                                              • C:\Users\Admin\Downloads\chilledwindows.mp4

                                                                                                                                                                Filesize

                                                                                                                                                                3.6MB

                                                                                                                                                                MD5

                                                                                                                                                                698ddcaec1edcf1245807627884edf9c

                                                                                                                                                                SHA1

                                                                                                                                                                c7fcbeaa2aadffaf807c096c51fb14c47003ac20

                                                                                                                                                                SHA256

                                                                                                                                                                cde975f975d21edb2e5faa505205ab8a2c5a565ba1ff8585d1f0e372b2a1d78b

                                                                                                                                                                SHA512

                                                                                                                                                                a2c326f0c653edcd613a3cefc8d82006e843e69afc787c870aa1b9686a20d79e5ab4e9e60b04d1970f07d88318588c1305117810e73ac620afd1fb6511394155

                                                                                                                                                              • memory/788-948-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB

                                                                                                                                                              • memory/844-988-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB

                                                                                                                                                              • memory/1116-923-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB

                                                                                                                                                              • memory/1200-930-0x0000000000E30000-0x0000000000E31000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                4KB

                                                                                                                                                              • memory/1264-951-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB

                                                                                                                                                              • memory/1336-976-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB

                                                                                                                                                              • memory/1492-934-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB

                                                                                                                                                              • memory/1492-884-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB

                                                                                                                                                              • memory/1548-978-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB

                                                                                                                                                              • memory/1620-929-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB

                                                                                                                                                              • memory/1648-942-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB

                                                                                                                                                              • memory/1648-950-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB

                                                                                                                                                              • memory/1820-888-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB

                                                                                                                                                              • memory/2028-947-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB

                                                                                                                                                              • memory/2164-899-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB

                                                                                                                                                              • memory/2440-933-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB

                                                                                                                                                              • memory/2500-986-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB

                                                                                                                                                              • memory/2588-847-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB

                                                                                                                                                              • memory/2640-919-0x0000000000AD0000-0x0000000000AD1000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                4KB

                                                                                                                                                              • memory/2640-873-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB

                                                                                                                                                              • memory/2852-871-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB

                                                                                                                                                              • memory/2884-914-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB

                                                                                                                                                              • memory/2948-918-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB

                                                                                                                                                              • memory/3128-987-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB

                                                                                                                                                              • memory/3180-927-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB

                                                                                                                                                              • memory/3188-1485-0x0000000000E00000-0x0000000001264000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                4.4MB

                                                                                                                                                              • memory/3188-1498-0x000000001CBC0000-0x000000001CBF8000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                224KB

                                                                                                                                                              • memory/3188-1499-0x000000001C710000-0x000000001C71E000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                56KB

                                                                                                                                                              • memory/3188-1497-0x000000001C6B0000-0x000000001C6B8000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                32KB

                                                                                                                                                              • memory/3228-936-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB

                                                                                                                                                              • memory/3240-949-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB

                                                                                                                                                              • memory/3388-6-0x0000000000400000-0x000000000071C000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                3.1MB

                                                                                                                                                              • memory/3388-7-0x0000000000400000-0x000000000071C000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                3.1MB

                                                                                                                                                              • memory/3464-938-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB

                                                                                                                                                              • memory/3480-869-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB

                                                                                                                                                              • memory/3520-910-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB

                                                                                                                                                              • memory/3568-962-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB

                                                                                                                                                              • memory/3652-925-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB

                                                                                                                                                              • memory/3676-928-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB

                                                                                                                                                              • memory/3704-2-0x0000000000401000-0x00000000004B7000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                728KB

                                                                                                                                                              • memory/3704-0-0x0000000000400000-0x00000000004D8000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                864KB

                                                                                                                                                              • memory/3704-9-0x0000000000400000-0x00000000004D8000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                864KB

                                                                                                                                                              • memory/3960-926-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB

                                                                                                                                                              • memory/3988-975-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB

                                                                                                                                                              • memory/4052-952-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB

                                                                                                                                                              • memory/4104-985-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB

                                                                                                                                                              • memory/4188-867-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB

                                                                                                                                                              • memory/4368-921-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB

                                                                                                                                                              • memory/4480-912-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB

                                                                                                                                                              • memory/4512-984-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB

                                                                                                                                                              • memory/4556-916-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB

                                                                                                                                                              • memory/4556-945-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB

                                                                                                                                                              • memory/4632-939-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB

                                                                                                                                                              • memory/4740-886-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB

                                                                                                                                                              • memory/4772-981-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB

                                                                                                                                                              • memory/4788-964-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB

                                                                                                                                                              • memory/4844-977-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB

                                                                                                                                                              • memory/4864-935-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB

                                                                                                                                                              • memory/5008-937-0x0000000013140000-0x000000001320F000-memory.dmp

                                                                                                                                                                Filesize

                                                                                                                                                                828KB