Analysis

  • max time kernel
    1792s
  • max time network
    1800s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241023-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    04-11-2024 03:49

General

  • Target

    Client-built.exe

  • Size

    3.1MB

  • MD5

    f5b93af3ee1b64dacd2bac9ba4af9b27

  • SHA1

    1f2a038199a71a2b917dca4dff2f5fac5e840978

  • SHA256

    48d4fde21b28f0614fdf124f83f5594bddc13292f21b775da58b017385a49b01

  • SHA512

    83703b0f567723abe3d6b34bd419be5df3475e049ae8893993fec017da9a420cd875184c570bdffbfc0bccac662762991885dea8ebcc2af172b3aac2fb00a302

  • SSDEEP

    49152:mv2I22SsaNYfdPBldt698dBcjHQzRJ6TbR3LoGd/oobTHHB72eh2NT:mvb22SsaNYfdPBldt6+dBcjHQzRJ6FA

Malware Config

Extracted

Family

quasar

Version

1.4.1

Botnet

Office04

C2

Inversin-43597.portmap.host:43597

Mutex

80329fd2-f063-4b06-9c7e-8dbc6278c2a3

Attributes
  • encryption_key

    744EA1A385FEBC6DA96387411B7000D77E66B075

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    java updater

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 34 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 36 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 39 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 19 IoCs
  • Opens file in notepad (likely ransom note) 13 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 43 IoCs
  • Suspicious use of SendNotifyMessage 37 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Client-built.exe
    "C:\Users\Admin\AppData\Local\Temp\Client-built.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2516
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:2152
    • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe
      "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:4936
      • C:\Windows\SYSTEM32\schtasks.exe
        "schtasks" /create /tn "java updater" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\SubDir\Client.exe" /rl HIGHEST /f
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:4680
      • C:\Windows\system32\mspaint.exe
        "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Pictures\HideResume.gif"
        3⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:3860
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Pictures\desktop.ini
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:4952
      • C:\Windows\system32\mspaint.exe
        "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Pictures\HideResume.gif"
        3⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:3540
      • C:\Windows\system32\mspaint.exe
        "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Pictures\HideResume.jpg"
        3⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:2384
      • C:\Windows\system32\mspaint.exe
        "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Pictures\My Wallpaper.jpg"
        3⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:2648
      • C:\Windows\system32\mspaint.exe
        "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Pictures\OpenWrite.png"
        3⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:1888
      • C:\Windows\system32\mspaint.exe
        "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Pictures\StopSave.emf"
        3⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:2772
      • C:\Windows\system32\mspaint.exe
        "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Pictures\TestFind.bmp"
        3⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:4232
      • C:\Windows\system32\mspaint.exe
        "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Pictures\UnprotectNew.emf"
        3⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:3024
      • C:\Windows\system32\mspaint.exe
        "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Pictures\UnregisterEdit.dib"
        3⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:1876
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\BlockNew.txt
        3⤵
        • Opens file in notepad (likely ransom note)
        PID:1668
      • C:\Windows\system32\mspaint.exe
        "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Roaming\ConvertDebug.wmf"
        3⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:860
      • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
        "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Roaming\DebugReceive.xlsx"
        3⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:4724
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Roaming\DisableWatch.mht
        3⤵
        • Enumerates system info in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:3700
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x124,0x128,0x12c,0x100,0x130,0x7ff9cad546f8,0x7ff9cad54708,0x7ff9cad54718
          4⤵
            PID:3176
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,5424652718573575902,2049363140299123343,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:2
            4⤵
              PID:2352
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2212,5424652718573575902,2049363140299123343,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:3
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:3292
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2212,5424652718573575902,2049363140299123343,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:8
              4⤵
                PID:3436
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5424652718573575902,2049363140299123343,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:1
                4⤵
                  PID:464
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5424652718573575902,2049363140299123343,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:1
                  4⤵
                    PID:4840
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5424652718573575902,2049363140299123343,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:1
                    4⤵
                      PID:5744
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5424652718573575902,2049363140299123343,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:1
                      4⤵
                        PID:5892
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5424652718573575902,2049363140299123343,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:1
                        4⤵
                          PID:5948
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=ppapi --field-trial-handle=2212,5424652718573575902,2049363140299123343,131072 --lang=en-US --device-scale-factor=1 --ppapi-antialiased-text-enabled=1 --ppapi-subpixel-rendering-setting=1 --mojo-platform-channel-handle=4056 /prefetch:6
                          4⤵
                            PID:5376
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5424652718573575902,2049363140299123343,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:1
                            4⤵
                              PID:5788
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5424652718573575902,2049363140299123343,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5852 /prefetch:1
                              4⤵
                                PID:5836
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5424652718573575902,2049363140299123343,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6172 /prefetch:1
                                4⤵
                                  PID:1936
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5424652718573575902,2049363140299123343,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6256 /prefetch:1
                                  4⤵
                                    PID:6132
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5424652718573575902,2049363140299123343,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6128 /prefetch:1
                                    4⤵
                                      PID:6204
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5424652718573575902,2049363140299123343,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7056 /prefetch:1
                                      4⤵
                                        PID:6752
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5424652718573575902,2049363140299123343,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6020 /prefetch:1
                                        4⤵
                                          PID:6336
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5424652718573575902,2049363140299123343,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7572 /prefetch:1
                                          4⤵
                                            PID:6192
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5424652718573575902,2049363140299123343,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7796 /prefetch:1
                                            4⤵
                                              PID:7316
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5424652718573575902,2049363140299123343,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7968 /prefetch:1
                                              4⤵
                                                PID:7860
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings
                                                4⤵
                                                • Drops file in Program Files directory
                                                PID:7304
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0x7ff634f05460,0x7ff634f05470,0x7ff634f05480
                                                  5⤵
                                                    PID:7288
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,5424652718573575902,2049363140299123343,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=8476 /prefetch:8
                                                  4⤵
                                                    PID:7444
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,5424652718573575902,2049363140299123343,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=8476 /prefetch:8
                                                    4⤵
                                                      PID:7712
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5424652718573575902,2049363140299123343,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7496 /prefetch:1
                                                      4⤵
                                                        PID:8324
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5424652718573575902,2049363140299123343,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6952 /prefetch:1
                                                        4⤵
                                                          PID:8504
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5424652718573575902,2049363140299123343,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8092 /prefetch:1
                                                          4⤵
                                                            PID:8628
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5424652718573575902,2049363140299123343,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6788 /prefetch:1
                                                            4⤵
                                                              PID:8636
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5424652718573575902,2049363140299123343,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:1
                                                              4⤵
                                                                PID:9916
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5424652718573575902,2049363140299123343,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6304 /prefetch:1
                                                                4⤵
                                                                  PID:10040
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,5424652718573575902,2049363140299123343,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1328 /prefetch:1
                                                                  4⤵
                                                                    PID:10056
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,5424652718573575902,2049363140299123343,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1368 /prefetch:2
                                                                    4⤵
                                                                      PID:7496
                                                                  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
                                                                    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Roaming\EnterRemove.xlsm"
                                                                    3⤵
                                                                    • Checks processor information in registry
                                                                    • Enumerates system info in registry
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:1100
                                                                  • C:\Windows\system32\mspaint.exe
                                                                    "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Roaming\EnterShow.emf"
                                                                    3⤵
                                                                    • Drops file in Windows directory
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:3704
                                                                  • C:\Windows\system32\cmd.exe
                                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\ImportSave.bat" "
                                                                    3⤵
                                                                      PID:1116
                                                                    • C:\Windows\system32\mspaint.exe
                                                                      "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Roaming\MeasureResume.rle"
                                                                      3⤵
                                                                      • Drops file in Windows directory
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:4048
                                                                    • C:\Program Files\Internet Explorer\iexplore.exe
                                                                      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Roaming\MountCompare.xsl
                                                                      3⤵
                                                                      • Modifies Internet Explorer settings
                                                                      • Suspicious use of FindShellTrayWindow
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:4588
                                                                      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4588 CREDAT:17410 /prefetch:2
                                                                        4⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Modifies Internet Explorer settings
                                                                        PID:1752
                                                                      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4588 CREDAT:82946 /prefetch:2
                                                                        4⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Modifies Internet Explorer settings
                                                                        PID:4844
                                                                      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4588 CREDAT:17420 /prefetch:2
                                                                        4⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Modifies Internet Explorer settings
                                                                        PID:6652
                                                                      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4588 CREDAT:82948 /prefetch:2
                                                                        4⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Modifies Internet Explorer settings
                                                                        PID:3644
                                                                      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4588 CREDAT:82952 /prefetch:2
                                                                        4⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Modifies Internet Explorer settings
                                                                        PID:8708
                                                                      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4588 CREDAT:82956 /prefetch:2
                                                                        4⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:10200
                                                                    • C:\Windows\system32\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\RenameSplit.cmd" "
                                                                      3⤵
                                                                        PID:5156
                                                                      • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
                                                                        "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Roaming\RepairConvertFrom.ods"
                                                                        3⤵
                                                                        • Checks processor information in registry
                                                                        • Enumerates system info in registry
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        PID:5256
                                                                      • C:\Windows\system32\mspaint.exe
                                                                        "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Roaming\ResizeApprove.jfif"
                                                                        3⤵
                                                                        • Drops file in Windows directory
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        PID:5368
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Roaming\RevokeApprove.pdf
                                                                        3⤵
                                                                          PID:5648
                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x128,0x12c,0x130,0x104,0x134,0x7ff9cad546f8,0x7ff9cad54708,0x7ff9cad54718
                                                                            4⤵
                                                                              PID:5668
                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Roaming\RevokeDisable.html
                                                                            3⤵
                                                                              PID:5720
                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x128,0x12c,0x130,0x104,0x134,0x7ff9cad546f8,0x7ff9cad54708,0x7ff9cad54718
                                                                                4⤵
                                                                                  PID:5760
                                                                              • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                                                "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Roaming\SuspendGet.mid"
                                                                                3⤵
                                                                                • Suspicious behavior: AddClipboardFormatListener
                                                                                • Suspicious behavior: GetForegroundWindowSpam
                                                                                • Suspicious use of FindShellTrayWindow
                                                                                • Suspicious use of SendNotifyMessage
                                                                                PID:5476
                                                                              • C:\Windows\system32\NOTEPAD.EXE
                                                                                "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\SwitchMeasure.ini
                                                                                3⤵
                                                                                • Opens file in notepad (likely ransom note)
                                                                                PID:5336
                                                                              • C:\Windows\system32\mspaint.exe
                                                                                "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Roaming\TestMerge.jpeg"
                                                                                3⤵
                                                                                • Drops file in Windows directory
                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                PID:2360
                                                                              • C:\Windows\System32\notepad.exe
                                                                                "C:\Windows\System32\notepad.exe" "C:\Users\Admin\AppData\Roaming\UninstallProtect.ps1"
                                                                                3⤵
                                                                                • Opens file in notepad (likely ransom note)
                                                                                PID:5556
                                                                              • C:\Windows\system32\mspaint.exe
                                                                                "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Roaming\UninstallPush.gif"
                                                                                3⤵
                                                                                • Drops file in Windows directory
                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                PID:1820
                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Roaming\WriteLimit.pdf
                                                                                3⤵
                                                                                  PID:5620
                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x128,0x12c,0x130,0x104,0x134,0x7ff9cad546f8,0x7ff9cad54708,0x7ff9cad54718
                                                                                    4⤵
                                                                                      PID:5896
                                                                                  • C:\Windows\system32\NOTEPAD.EXE
                                                                                    "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\BlockNew.txt
                                                                                    3⤵
                                                                                    • Opens file in notepad (likely ransom note)
                                                                                    PID:6452
                                                                                  • C:\Windows\system32\mspaint.exe
                                                                                    "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Roaming\ConvertDebug.wmf"
                                                                                    3⤵
                                                                                    • Drops file in Windows directory
                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                    PID:6536
                                                                                  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
                                                                                    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Roaming\DebugReceive.xlsx"
                                                                                    3⤵
                                                                                    • Checks processor information in registry
                                                                                    • Enumerates system info in registry
                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                    PID:6584
                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Roaming\DisableWatch.mht
                                                                                    3⤵
                                                                                      PID:6616
                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x128,0x12c,0x130,0x104,0x134,0x7ff9cad546f8,0x7ff9cad54708,0x7ff9cad54718
                                                                                        4⤵
                                                                                          PID:6628
                                                                                      • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
                                                                                        "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Roaming\EnterRemove.xlsm"
                                                                                        3⤵
                                                                                        • Checks processor information in registry
                                                                                        • Enumerates system info in registry
                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                        PID:6708
                                                                                      • C:\Windows\system32\mspaint.exe
                                                                                        "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Roaming\EnterShow.emf"
                                                                                        3⤵
                                                                                        • Drops file in Windows directory
                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                        PID:6796
                                                                                      • C:\Windows\system32\cmd.exe
                                                                                        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\ImportSave.bat" "
                                                                                        3⤵
                                                                                          PID:7144
                                                                                        • C:\Windows\system32\mspaint.exe
                                                                                          "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Roaming\MeasureResume.rle"
                                                                                          3⤵
                                                                                          • Drops file in Windows directory
                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                          PID:6224
                                                                                        • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                          "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Roaming\MountCompare.xsl
                                                                                          3⤵
                                                                                          • Modifies Internet Explorer settings
                                                                                          PID:6332
                                                                                        • C:\Windows\system32\cmd.exe
                                                                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\RenameSplit.cmd" "
                                                                                          3⤵
                                                                                            PID:6356
                                                                                          • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
                                                                                            "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Roaming\RepairConvertFrom.ods"
                                                                                            3⤵
                                                                                            • Checks processor information in registry
                                                                                            • Enumerates system info in registry
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            PID:6388
                                                                                          • C:\Windows\system32\mspaint.exe
                                                                                            "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Roaming\ResizeApprove.jfif"
                                                                                            3⤵
                                                                                            • Drops file in Windows directory
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            PID:6528
                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Roaming\RevokeApprove.pdf
                                                                                            3⤵
                                                                                              PID:7028
                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x128,0x12c,0x130,0x104,0x134,0x7ff9cad546f8,0x7ff9cad54708,0x7ff9cad54718
                                                                                                4⤵
                                                                                                  PID:6520
                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Roaming\RevokeDisable.html
                                                                                                3⤵
                                                                                                  PID:6344
                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x10c,0x130,0x134,0xd0,0xd4,0x7ff9cad546f8,0x7ff9cad54708,0x7ff9cad54718
                                                                                                    4⤵
                                                                                                      PID:6156
                                                                                                  • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                                                                    "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Roaming\SuspendGet.mid"
                                                                                                    3⤵
                                                                                                      PID:6852
                                                                                                    • C:\Windows\system32\NOTEPAD.EXE
                                                                                                      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\SwitchMeasure.ini
                                                                                                      3⤵
                                                                                                      • Opens file in notepad (likely ransom note)
                                                                                                      PID:6828
                                                                                                    • C:\Windows\system32\mspaint.exe
                                                                                                      "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Roaming\TestMerge.jpeg"
                                                                                                      3⤵
                                                                                                      • Drops file in Windows directory
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      PID:7076
                                                                                                    • C:\Windows\System32\notepad.exe
                                                                                                      "C:\Windows\System32\notepad.exe" "C:\Users\Admin\AppData\Roaming\UninstallProtect.ps1"
                                                                                                      3⤵
                                                                                                      • Opens file in notepad (likely ransom note)
                                                                                                      PID:6340
                                                                                                    • C:\Windows\system32\mspaint.exe
                                                                                                      "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Roaming\UninstallPush.gif"
                                                                                                      3⤵
                                                                                                      • Drops file in Windows directory
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      PID:6896
                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Roaming\WriteLimit.pdf
                                                                                                      3⤵
                                                                                                        PID:7220
                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x128,0x12c,0x130,0x104,0x134,0x7ff9cad546f8,0x7ff9cad54708,0x7ff9cad54718
                                                                                                          4⤵
                                                                                                            PID:7236
                                                                                                        • C:\Windows\system32\NOTEPAD.EXE
                                                                                                          "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\BlockNew.txt
                                                                                                          3⤵
                                                                                                          • Opens file in notepad (likely ransom note)
                                                                                                          PID:7568
                                                                                                        • C:\Windows\system32\mspaint.exe
                                                                                                          "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Roaming\ConvertDebug.wmf"
                                                                                                          3⤵
                                                                                                          • Drops file in Windows directory
                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                          PID:7644
                                                                                                        • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
                                                                                                          "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Roaming\DebugReceive.xlsx"
                                                                                                          3⤵
                                                                                                          • Checks processor information in registry
                                                                                                          • Enumerates system info in registry
                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                          PID:7692
                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Roaming\DisableWatch.mht
                                                                                                          3⤵
                                                                                                            PID:7728
                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x128,0x12c,0x130,0x104,0x134,0x7ff9cad546f8,0x7ff9cad54708,0x7ff9cad54718
                                                                                                              4⤵
                                                                                                                PID:7740
                                                                                                            • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
                                                                                                              "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Roaming\EnterRemove.xlsm"
                                                                                                              3⤵
                                                                                                              • Checks processor information in registry
                                                                                                              • Enumerates system info in registry
                                                                                                              PID:7808
                                                                                                            • C:\Windows\system32\mspaint.exe
                                                                                                              "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Roaming\EnterShow.emf"
                                                                                                              3⤵
                                                                                                              • Drops file in Windows directory
                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                              PID:7920
                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\ImportSave.bat" "
                                                                                                              3⤵
                                                                                                                PID:7472
                                                                                                              • C:\Windows\system32\mspaint.exe
                                                                                                                "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Roaming\MeasureResume.rle"
                                                                                                                3⤵
                                                                                                                • Drops file in Windows directory
                                                                                                                PID:7840
                                                                                                              • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                                                "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Roaming\MountCompare.xsl
                                                                                                                3⤵
                                                                                                                • Modifies Internet Explorer settings
                                                                                                                PID:7668
                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\RenameSplit.cmd" "
                                                                                                                3⤵
                                                                                                                  PID:3684
                                                                                                                • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
                                                                                                                  "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Roaming\RepairConvertFrom.ods"
                                                                                                                  3⤵
                                                                                                                  • Checks processor information in registry
                                                                                                                  • Enumerates system info in registry
                                                                                                                  PID:7176
                                                                                                                • C:\Windows\system32\mspaint.exe
                                                                                                                  "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Roaming\ResizeApprove.jfif"
                                                                                                                  3⤵
                                                                                                                  • Drops file in Windows directory
                                                                                                                  PID:7428
                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Roaming\RevokeApprove.pdf
                                                                                                                  3⤵
                                                                                                                    PID:8224
                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x128,0x12c,0x130,0x104,0x134,0x7ff9cad546f8,0x7ff9cad54708,0x7ff9cad54718
                                                                                                                      4⤵
                                                                                                                        PID:8244
                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Roaming\RevokeDisable.html
                                                                                                                      3⤵
                                                                                                                        PID:8308
                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x128,0x12c,0x130,0x104,0x134,0x7ff9cad546f8,0x7ff9cad54708,0x7ff9cad54718
                                                                                                                          4⤵
                                                                                                                            PID:8340
                                                                                                                        • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                                                                                          "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Roaming\SuspendGet.mid"
                                                                                                                          3⤵
                                                                                                                            PID:8792
                                                                                                                          • C:\Windows\system32\NOTEPAD.EXE
                                                                                                                            "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\SwitchMeasure.ini
                                                                                                                            3⤵
                                                                                                                            • Opens file in notepad (likely ransom note)
                                                                                                                            PID:8904
                                                                                                                          • C:\Windows\system32\mspaint.exe
                                                                                                                            "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Roaming\TestMerge.jpeg"
                                                                                                                            3⤵
                                                                                                                            • Drops file in Windows directory
                                                                                                                            PID:8936
                                                                                                                          • C:\Windows\System32\notepad.exe
                                                                                                                            "C:\Windows\System32\notepad.exe" "C:\Users\Admin\AppData\Roaming\UninstallProtect.ps1"
                                                                                                                            3⤵
                                                                                                                            • Opens file in notepad (likely ransom note)
                                                                                                                            PID:9084
                                                                                                                          • C:\Windows\system32\mspaint.exe
                                                                                                                            "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Roaming\UninstallPush.gif"
                                                                                                                            3⤵
                                                                                                                            • Drops file in Windows directory
                                                                                                                            PID:9132
                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Roaming\WriteLimit.pdf
                                                                                                                            3⤵
                                                                                                                              PID:7664
                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x128,0x12c,0x130,0x104,0x134,0x7ff9cad546f8,0x7ff9cad54708,0x7ff9cad54718
                                                                                                                                4⤵
                                                                                                                                  PID:7832
                                                                                                                              • C:\Windows\system32\NOTEPAD.EXE
                                                                                                                                "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\BlockNew.txt
                                                                                                                                3⤵
                                                                                                                                • Opens file in notepad (likely ransom note)
                                                                                                                                PID:8948
                                                                                                                              • C:\Windows\system32\mspaint.exe
                                                                                                                                "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Roaming\ConvertDebug.wmf"
                                                                                                                                3⤵
                                                                                                                                • Drops file in Windows directory
                                                                                                                                PID:5316
                                                                                                                              • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
                                                                                                                                "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Roaming\DebugReceive.xlsx"
                                                                                                                                3⤵
                                                                                                                                • Checks processor information in registry
                                                                                                                                • Enumerates system info in registry
                                                                                                                                PID:9176
                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Roaming\DisableWatch.mht
                                                                                                                                3⤵
                                                                                                                                  PID:8740
                                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x12c,0x130,0x134,0x104,0x138,0x7ff9cad546f8,0x7ff9cad54708,0x7ff9cad54718
                                                                                                                                    4⤵
                                                                                                                                      PID:8680
                                                                                                                                  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
                                                                                                                                    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Roaming\EnterRemove.xlsm"
                                                                                                                                    3⤵
                                                                                                                                    • Checks processor information in registry
                                                                                                                                    • Enumerates system info in registry
                                                                                                                                    PID:8180
                                                                                                                                  • C:\Windows\system32\mspaint.exe
                                                                                                                                    "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Roaming\EnterShow.emf"
                                                                                                                                    3⤵
                                                                                                                                    • Drops file in Windows directory
                                                                                                                                    PID:8704
                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\ImportSave.bat" "
                                                                                                                                    3⤵
                                                                                                                                      PID:7696
                                                                                                                                    • C:\Windows\system32\mspaint.exe
                                                                                                                                      "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Roaming\MeasureResume.rle"
                                                                                                                                      3⤵
                                                                                                                                      • Drops file in Windows directory
                                                                                                                                      PID:8980
                                                                                                                                    • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                                                                      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Roaming\MountCompare.xsl
                                                                                                                                      3⤵
                                                                                                                                      • Modifies Internet Explorer settings
                                                                                                                                      PID:9008
                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\RenameSplit.cmd" "
                                                                                                                                      3⤵
                                                                                                                                        PID:9372
                                                                                                                                      • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
                                                                                                                                        "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Roaming\RepairConvertFrom.ods"
                                                                                                                                        3⤵
                                                                                                                                        • Checks processor information in registry
                                                                                                                                        • Enumerates system info in registry
                                                                                                                                        PID:9420
                                                                                                                                      • C:\Windows\system32\mspaint.exe
                                                                                                                                        "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Roaming\ResizeApprove.jfif"
                                                                                                                                        3⤵
                                                                                                                                        • Drops file in Windows directory
                                                                                                                                        PID:9460
                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Roaming\RevokeApprove.pdf
                                                                                                                                        3⤵
                                                                                                                                          PID:9728
                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x128,0x12c,0x130,0x104,0x134,0x7ff9cad546f8,0x7ff9cad54708,0x7ff9cad54718
                                                                                                                                            4⤵
                                                                                                                                              PID:9752
                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Roaming\RevokeDisable.html
                                                                                                                                            3⤵
                                                                                                                                              PID:9820
                                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x128,0x12c,0x130,0x104,0x134,0x7ff9cad546f8,0x7ff9cad54708,0x7ff9cad54718
                                                                                                                                                4⤵
                                                                                                                                                  PID:9844
                                                                                                                                              • C:\Program Files\VideoLAN\VLC\vlc.exe
                                                                                                                                                "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\AppData\Roaming\SuspendGet.mid"
                                                                                                                                                3⤵
                                                                                                                                                  PID:9224
                                                                                                                                                • C:\Windows\system32\NOTEPAD.EXE
                                                                                                                                                  "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Roaming\SwitchMeasure.ini
                                                                                                                                                  3⤵
                                                                                                                                                  • Opens file in notepad (likely ransom note)
                                                                                                                                                  PID:9324
                                                                                                                                                • C:\Windows\system32\mspaint.exe
                                                                                                                                                  "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Roaming\TestMerge.jpeg"
                                                                                                                                                  3⤵
                                                                                                                                                  • Drops file in Windows directory
                                                                                                                                                  PID:1468
                                                                                                                                                • C:\Windows\System32\notepad.exe
                                                                                                                                                  "C:\Windows\System32\notepad.exe" "C:\Users\Admin\AppData\Roaming\UninstallProtect.ps1"
                                                                                                                                                  3⤵
                                                                                                                                                  • Opens file in notepad (likely ransom note)
                                                                                                                                                  PID:8860
                                                                                                                                                • C:\Windows\system32\mspaint.exe
                                                                                                                                                  "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Roaming\UninstallPush.gif"
                                                                                                                                                  3⤵
                                                                                                                                                  • Drops file in Windows directory
                                                                                                                                                  PID:6872
                                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Roaming\WriteLimit.pdf
                                                                                                                                                  3⤵
                                                                                                                                                    PID:4148
                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x12c,0x130,0x134,0x128,0x138,0x7ff9cad546f8,0x7ff9cad54708,0x7ff9cad54718
                                                                                                                                                      4⤵
                                                                                                                                                        PID:9704
                                                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                                                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService
                                                                                                                                                  1⤵
                                                                                                                                                    PID:540
                                                                                                                                                  • C:\Windows\system32\OpenWith.exe
                                                                                                                                                    C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                    1⤵
                                                                                                                                                    • Modifies registry class
                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                    PID:32
                                                                                                                                                  • C:\Windows\system32\OpenWith.exe
                                                                                                                                                    C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                    1⤵
                                                                                                                                                    • Modifies registry class
                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                    PID:100
                                                                                                                                                  • C:\Windows\system32\OpenWith.exe
                                                                                                                                                    C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                    1⤵
                                                                                                                                                    • Modifies registry class
                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                    PID:4444
                                                                                                                                                  • C:\Windows\system32\OpenWith.exe
                                                                                                                                                    C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                    1⤵
                                                                                                                                                    • Modifies registry class
                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                    PID:2856
                                                                                                                                                  • C:\Windows\system32\OpenWith.exe
                                                                                                                                                    C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                    1⤵
                                                                                                                                                    • Modifies registry class
                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                    PID:5012
                                                                                                                                                  • C:\Windows\system32\OpenWith.exe
                                                                                                                                                    C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                    1⤵
                                                                                                                                                    • Modifies registry class
                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                    PID:4728
                                                                                                                                                  • C:\Windows\system32\OpenWith.exe
                                                                                                                                                    C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                    1⤵
                                                                                                                                                    • Modifies registry class
                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                    PID:3984
                                                                                                                                                  • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
                                                                                                                                                    "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /Play -Embedding
                                                                                                                                                    1⤵
                                                                                                                                                    • Enumerates connected drives
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                    • Suspicious use of FindShellTrayWindow
                                                                                                                                                    • Suspicious use of WriteProcessMemory
                                                                                                                                                    PID:880
                                                                                                                                                    • C:\Windows\SysWOW64\unregmp2.exe
                                                                                                                                                      "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
                                                                                                                                                      2⤵
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      • Suspicious use of WriteProcessMemory
                                                                                                                                                      PID:640
                                                                                                                                                      • C:\Windows\system32\unregmp2.exe
                                                                                                                                                        "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
                                                                                                                                                        3⤵
                                                                                                                                                        • Enumerates connected drives
                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                        PID:912
                                                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                                                    C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost
                                                                                                                                                    1⤵
                                                                                                                                                    • Drops file in Windows directory
                                                                                                                                                    PID:4692
                                                                                                                                                  • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                    1⤵
                                                                                                                                                      PID:2808
                                                                                                                                                    • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                      1⤵
                                                                                                                                                        PID:2412
                                                                                                                                                      • C:\Windows\system32\AUDIODG.EXE
                                                                                                                                                        C:\Windows\system32\AUDIODG.EXE 0x4d8 0x300
                                                                                                                                                        1⤵
                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                        PID:4500
                                                                                                                                                      • C:\Windows\system32\OpenWith.exe
                                                                                                                                                        C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                        1⤵
                                                                                                                                                        • Modifies registry class
                                                                                                                                                        PID:5860
                                                                                                                                                      • C:\Windows\system32\OpenWith.exe
                                                                                                                                                        C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                        1⤵
                                                                                                                                                        • Modifies registry class
                                                                                                                                                        PID:5724
                                                                                                                                                      • C:\Windows\system32\OpenWith.exe
                                                                                                                                                        C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                        1⤵
                                                                                                                                                        • Modifies registry class
                                                                                                                                                        PID:6368
                                                                                                                                                      • C:\Windows\system32\OpenWith.exe
                                                                                                                                                        C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                        1⤵
                                                                                                                                                        • Modifies registry class
                                                                                                                                                        PID:4248
                                                                                                                                                      • C:\Windows\system32\OpenWith.exe
                                                                                                                                                        C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                        1⤵
                                                                                                                                                        • Modifies registry class
                                                                                                                                                        PID:5596
                                                                                                                                                      • C:\Windows\system32\OpenWith.exe
                                                                                                                                                        C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                        1⤵
                                                                                                                                                        • Modifies registry class
                                                                                                                                                        PID:7504
                                                                                                                                                      • C:\Windows\system32\OpenWith.exe
                                                                                                                                                        C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                        1⤵
                                                                                                                                                        • Modifies registry class
                                                                                                                                                        PID:8460
                                                                                                                                                      • C:\Windows\system32\OpenWith.exe
                                                                                                                                                        C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                        1⤵
                                                                                                                                                        • Modifies registry class
                                                                                                                                                        PID:7696
                                                                                                                                                      • C:\Windows\system32\OpenWith.exe
                                                                                                                                                        C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                        1⤵
                                                                                                                                                        • Modifies registry class
                                                                                                                                                        PID:8864
                                                                                                                                                      • C:\Windows\system32\OpenWith.exe
                                                                                                                                                        C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                        1⤵
                                                                                                                                                        • Modifies registry class
                                                                                                                                                        PID:9908
                                                                                                                                                      • C:\Windows\system32\OpenWith.exe
                                                                                                                                                        C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                        1⤵
                                                                                                                                                        • Modifies registry class
                                                                                                                                                        PID:9492

                                                                                                                                                      Network

                                                                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                                                                      Replay Monitor

                                                                                                                                                      Loading Replay Monitor...

                                                                                                                                                      Downloads

                                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A

                                                                                                                                                        Filesize

                                                                                                                                                        471B

                                                                                                                                                        MD5

                                                                                                                                                        8a30a9b50fedce017b52120d4343b95a

                                                                                                                                                        SHA1

                                                                                                                                                        8de5de177d1008f9667108f6b5802a2a52b88a88

                                                                                                                                                        SHA256

                                                                                                                                                        4550fdafe58e9e306e641eefdb4bfd0a0f560bad671dfe5730a4ef029b3ffb3d

                                                                                                                                                        SHA512

                                                                                                                                                        7edf4b47f415103805bf251adb8e135398ca632eced27d87ee5d40f8854edc7bdf06e84173ed537791dd0a56554d6e692e500274f991bec08d408f9dc73cbab1

                                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9

                                                                                                                                                        Filesize

                                                                                                                                                        471B

                                                                                                                                                        MD5

                                                                                                                                                        b4c368f8851eec362f9bab6aa80623da

                                                                                                                                                        SHA1

                                                                                                                                                        1960934afb425ff73c3b6546f307e74e64f343ff

                                                                                                                                                        SHA256

                                                                                                                                                        9009daecfdb4168f9c167f4742b4f99e650ab1f967f98424d1a3e688f18389c1

                                                                                                                                                        SHA512

                                                                                                                                                        2388b164753293d451f7acb162234f15071718f97f5cb340ef3616b81f418a77e3edf8031222861a84aacd3d4e528308c8c5e150fbdbb48b1421edab2d95e723

                                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04

                                                                                                                                                        Filesize

                                                                                                                                                        471B

                                                                                                                                                        MD5

                                                                                                                                                        ccffb61f97b12ae337fd5856148a0214

                                                                                                                                                        SHA1

                                                                                                                                                        c55c7dfe9db06d95b5728ef458da3914a3b7bce1

                                                                                                                                                        SHA256

                                                                                                                                                        e374beca91eae778404f0048aea29cab754e8928ea1f9b5846912912bf86a246

                                                                                                                                                        SHA512

                                                                                                                                                        77d6a41c97beee34796c1300938aecc403f2a069cf7f432d1ecf6991b150b0fe11189bcfa30cb61304f2ec17d0abee097ba97774a31fe1483b224a4bc9d3f652

                                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A

                                                                                                                                                        Filesize

                                                                                                                                                        412B

                                                                                                                                                        MD5

                                                                                                                                                        e21ae0b73aca2599cbae19f6553fc6ed

                                                                                                                                                        SHA1

                                                                                                                                                        2cc124de7fb6e9a19e3c26d783f5846c829af5bd

                                                                                                                                                        SHA256

                                                                                                                                                        6aed975c0ece61d216bcfac4997b9b7618ececbb4669ffe83243839302951c9c

                                                                                                                                                        SHA512

                                                                                                                                                        5a837d27368500bf7feb67d0a9ad8ebc5784f11e6e79a7b826bf98c13f8c1060c44c35af3afa865dd4f096db2f2f0ec28380b1c4591b2cbdf1690f1c27bc787e

                                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9

                                                                                                                                                        Filesize

                                                                                                                                                        420B

                                                                                                                                                        MD5

                                                                                                                                                        e874d59919c36f53b1471d3f7fdb5aa6

                                                                                                                                                        SHA1

                                                                                                                                                        d272a5ce6fa1486240a2f5b835a15cb40864dbf2

                                                                                                                                                        SHA256

                                                                                                                                                        d2603293ddf7c02bad2db25cec453d4038915a38d4625f5bc1414a158c4de3db

                                                                                                                                                        SHA512

                                                                                                                                                        3aa6f602fd875dbeca9c693a282c85cd633f6ca55d56ca5eb239eb29979b1845ebc5846f820c95f112afa0da466eff8c04843e49d7fbd9a6c6cf6cc2e97df255

                                                                                                                                                      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04

                                                                                                                                                        Filesize

                                                                                                                                                        412B

                                                                                                                                                        MD5

                                                                                                                                                        d51af806078ab2a9ce8a861f8c822ad7

                                                                                                                                                        SHA1

                                                                                                                                                        fdc16f9fdc3abed9b665b8649631fa48eb1e8f54

                                                                                                                                                        SHA256

                                                                                                                                                        31355d4ca2235d1fd70a60bca30439df1971da90ebdc80564ad169a57a8b4f7a

                                                                                                                                                        SHA512

                                                                                                                                                        5c16cef649781ed7b7efe2ffa7d4c459d20c185905ee1a85cb90ee3c2e10496e4cf398d946a8258a85b26d782210650d7e385140abe9414c7b0f241ca6b732c4

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                        Filesize

                                                                                                                                                        152B

                                                                                                                                                        MD5

                                                                                                                                                        c29339188732b78d10f11d3fb23063cb

                                                                                                                                                        SHA1

                                                                                                                                                        2db38f26fbc92417888251d9e31be37c9380136f

                                                                                                                                                        SHA256

                                                                                                                                                        0a61fa9e17b9ae7812cdeda5e890b22b14e53fa14a90db334f721252a9c874c2

                                                                                                                                                        SHA512

                                                                                                                                                        77f1f5f78e73f4fc01151e7e2a553dc4ed9bf35dd3a9565501f698be373640f153c6d7fc83450b9d2f29aeaa72387dd627d56f287a46635c2da07c60bc3d6e2c

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                        Filesize

                                                                                                                                                        152B

                                                                                                                                                        MD5

                                                                                                                                                        ccff51f965f8f4176e4ad112c34c86a7

                                                                                                                                                        SHA1

                                                                                                                                                        eab249ca0f58ed7a8afbca30bdae123136463cd8

                                                                                                                                                        SHA256

                                                                                                                                                        3eb00cf1bd645d308d0385a95a30737679be58dcc5433bc66216aac762d9da33

                                                                                                                                                        SHA512

                                                                                                                                                        8c68f146152045c2a78c9e52198b8180b261edf61a8c28364728eafb1cba1df0fa29906e5ede69b3c1e0b67cfcbeb7fde65b8d2edbc397c9a4b99ecfe8dea2dd

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                        Filesize

                                                                                                                                                        152B

                                                                                                                                                        MD5

                                                                                                                                                        9b4b5d40a9edfdb8bc4811b5d8a4f150

                                                                                                                                                        SHA1

                                                                                                                                                        374234a23aa51b9d0cf8c3f3e38e4c35e3c8b477

                                                                                                                                                        SHA256

                                                                                                                                                        7eb6ea2d25a9a5792aa85b4dffae9d189e85cd9ab5987d8d15758ec3785d813b

                                                                                                                                                        SHA512

                                                                                                                                                        eb0c5f3454f56a0109f3efe4365ec18c1a2a7675ec145b411b540620e2e6ea0e2b056b5d6ad0be0086deb735a979f60fdd1d722012e063723b034a27fe4dbfa8

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.ico

                                                                                                                                                        Filesize

                                                                                                                                                        70KB

                                                                                                                                                        MD5

                                                                                                                                                        e5e3377341056643b0494b6842c0b544

                                                                                                                                                        SHA1

                                                                                                                                                        d53fd8e256ec9d5cef8ef5387872e544a2df9108

                                                                                                                                                        SHA256

                                                                                                                                                        e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25

                                                                                                                                                        SHA512

                                                                                                                                                        83f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                        Filesize

                                                                                                                                                        5KB

                                                                                                                                                        MD5

                                                                                                                                                        4c97b7ca448a737527b49c1974e17531

                                                                                                                                                        SHA1

                                                                                                                                                        cbcc80adff704b1f5dba9b00a264ce8932fb0015

                                                                                                                                                        SHA256

                                                                                                                                                        fc6ca144ebdf961f765dc33527a739ba8b2dfe6f05b51910a24590536508c2eb

                                                                                                                                                        SHA512

                                                                                                                                                        20db679eb825f681e882a8265cc77f86b1c8f2b8564cd2e15c99bc927a41951dfcbeaf3522846270d786a23473161a22f1ce247fceb5b173a060547eaf11072e

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                        Filesize

                                                                                                                                                        5KB

                                                                                                                                                        MD5

                                                                                                                                                        d0805ebce472099461c0bcf09bed6bb2

                                                                                                                                                        SHA1

                                                                                                                                                        7f86a09c3e74ccb1851f5f1dd2838c131fc105bc

                                                                                                                                                        SHA256

                                                                                                                                                        5df362a9c04b83add3f7b14531c16819fbc16a6bdbe92b56d53197dc49f810da

                                                                                                                                                        SHA512

                                                                                                                                                        e1dcf4958f79ec68db7cf6b7bbcbd3755ea40fea22d8f34e49b31b97802178b1e903dcb037612510bef5b8a524506e719c7ff46909bad03b44899bb1131d03cd

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                        Filesize

                                                                                                                                                        5KB

                                                                                                                                                        MD5

                                                                                                                                                        2484d1bf963217a67c1324f1a887ee7a

                                                                                                                                                        SHA1

                                                                                                                                                        81a35a3f1f7a51b250c3d82016659bdcfe4ea1eb

                                                                                                                                                        SHA256

                                                                                                                                                        1906e2cba7cc2d99d4ec212aa441ab19455fc20c784547ba14b0200d82184952

                                                                                                                                                        SHA512

                                                                                                                                                        db20c4b9caa0ef745dc24bf2dba08590e6b134253172b6b734f916a29f52324b951bce4c0a7464bafdfdeafa9fa913007671bc7353fcc8dd62c831b643dd4686

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                        Filesize

                                                                                                                                                        4KB

                                                                                                                                                        MD5

                                                                                                                                                        a289815edae8319870cc5cb9fac96744

                                                                                                                                                        SHA1

                                                                                                                                                        c6e5b8d003f17124dc249e8117d3436d624440b2

                                                                                                                                                        SHA256

                                                                                                                                                        930124e8e192272ab479801fd6c72a9a498f9ba1f3600eaab4cb53cba98c59a8

                                                                                                                                                        SHA512

                                                                                                                                                        0c2a4a62456e3151fef2c6ae779b266ba34cef159157188d751c2824c9f696903ec8333b0dd7115a0f6010bac2e22e1da272ae60d2e863c2d9d40e593cf0e075

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                        Filesize

                                                                                                                                                        5KB

                                                                                                                                                        MD5

                                                                                                                                                        4020b23811c851d5656b4c0e70477294

                                                                                                                                                        SHA1

                                                                                                                                                        32e4abd6b2fbc385b5846ef862910dc24db211e0

                                                                                                                                                        SHA256

                                                                                                                                                        289782da169de06063de03fcb4c3d5691eb9fcdcedf6d6834b7224aa2fde3029

                                                                                                                                                        SHA512

                                                                                                                                                        31192b251bc291b9271e1be546e48b0e301f0ea5c808ccf19dcc6b556e6b2b7f836ce35b48220f75e2867b4c51334b7f1c8aa6b72db2291ca19177b30d828de6

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                                                                                                                        Filesize

                                                                                                                                                        24KB

                                                                                                                                                        MD5

                                                                                                                                                        26978f38b0bce48572b90b762b7d937c

                                                                                                                                                        SHA1

                                                                                                                                                        8b8b88012fab1d37fca79575a5db81674b424867

                                                                                                                                                        SHA256

                                                                                                                                                        b38f05e2e63a1f87026aed06f5b85354570c6f91d28947466f0555276bab6afa

                                                                                                                                                        SHA512

                                                                                                                                                        501e0de5f46bfaac901cde5c39a321edc411426fd91c83427f36710fa56d20b5f6ab8f2219d963f7ab495c2df7def879652381db3876b7e2a7080921cce78379

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                                                                                                                        Filesize

                                                                                                                                                        24KB

                                                                                                                                                        MD5

                                                                                                                                                        86aa28ffd286b08415aa197216684874

                                                                                                                                                        SHA1

                                                                                                                                                        d99924976c73e3220108817ad6bc1d8b1795ca2d

                                                                                                                                                        SHA256

                                                                                                                                                        a6dc4bc6ade3039e57b538f2620b91602199f1908b23c4a2beb3fd3aa721579d

                                                                                                                                                        SHA512

                                                                                                                                                        a51fbd1af778d32f2f95a9a863a59f42a7eb804dbb8ce85459297959eea21fbfe9625d74c3f91ad65016031d4b3e26eeb748c1c59e09ac68778fc670d408d0fa

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                        Filesize

                                                                                                                                                        16B

                                                                                                                                                        MD5

                                                                                                                                                        206702161f94c5cd39fadd03f4014d98

                                                                                                                                                        SHA1

                                                                                                                                                        bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                                                                                                                        SHA256

                                                                                                                                                        1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                                                                                                                        SHA512

                                                                                                                                                        0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\MANIFEST-000001

                                                                                                                                                        Filesize

                                                                                                                                                        41B

                                                                                                                                                        MD5

                                                                                                                                                        5af87dfd673ba2115e2fcf5cfdb727ab

                                                                                                                                                        SHA1

                                                                                                                                                        d5b5bbf396dc291274584ef71f444f420b6056f1

                                                                                                                                                        SHA256

                                                                                                                                                        f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                                                                                                                        SHA512

                                                                                                                                                        de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\CURRENT

                                                                                                                                                        Filesize

                                                                                                                                                        16B

                                                                                                                                                        MD5

                                                                                                                                                        46295cac801e5d4857d09837238a6394

                                                                                                                                                        SHA1

                                                                                                                                                        44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                                                                                        SHA256

                                                                                                                                                        0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                                                                                        SHA512

                                                                                                                                                        8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                        Filesize

                                                                                                                                                        8KB

                                                                                                                                                        MD5

                                                                                                                                                        58f548e17fb97c160e07cd3a4dcb9787

                                                                                                                                                        SHA1

                                                                                                                                                        56ef155c13ea8babb5b9320eee23495b50a4f0e8

                                                                                                                                                        SHA256

                                                                                                                                                        25c59060af5f75e4551cc3e8a9fdb49c632c79d9c65e7e1ff38e2973225e38aa

                                                                                                                                                        SHA512

                                                                                                                                                        1a9d8817a1f11d9e3232d16fea7f849b05ceaa375a0fce4d77b5610ecaed372a83fb20db60bebdaf7e061648e12d267b6449fe78f6ee0505c62ab7e593b6f4c9

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                        Filesize

                                                                                                                                                        10KB

                                                                                                                                                        MD5

                                                                                                                                                        f7772cb10a376a85f87f044eeb6aa36e

                                                                                                                                                        SHA1

                                                                                                                                                        39e25f3f854311531e452061e8b4d936dbc3b1a9

                                                                                                                                                        SHA256

                                                                                                                                                        6dac4b5a6a43b1fbdd5a86f60424ac0c35153ac168f66125d4eefa487954f319

                                                                                                                                                        SHA512

                                                                                                                                                        108b50f3ac051e2833792c920e0786870f61e4bd36b42600eea8120172957f5abb23a6e1ee2747d103b744687367185fe38daf45b59037be7a80390dea79b176

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

                                                                                                                                                        Filesize

                                                                                                                                                        1024KB

                                                                                                                                                        MD5

                                                                                                                                                        67eccc2e2b5e28f0701fb18e7fedf763

                                                                                                                                                        SHA1

                                                                                                                                                        f48df2d2dcde2d6dc8cb23e5884aeff21d85bf69

                                                                                                                                                        SHA256

                                                                                                                                                        b9021d079495eb147d4beadcdeaa0f770098006677e542b531fc2738c503878f

                                                                                                                                                        SHA512

                                                                                                                                                        b485a86f0dec67f9ec3f45a85f40a4dbc6f5f59640e87f71bca889f4def6cdc81706e684e4c13ce4b0a21024bfb1acfc23532b2188a52518eb63c007aac3b815

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

                                                                                                                                                        Filesize

                                                                                                                                                        256KB

                                                                                                                                                        MD5

                                                                                                                                                        563088ad0f20fabf9dd62c6ba8ae1636

                                                                                                                                                        SHA1

                                                                                                                                                        f9cd2fd153afa1a12ff990cf27c32b8c9c44e878

                                                                                                                                                        SHA256

                                                                                                                                                        eb897bf202d32f067728f1b666eb16e9926557efa8676b72db11411013030184

                                                                                                                                                        SHA512

                                                                                                                                                        8229dfb1d96b6a34b91b1e5c463833e7859331be880f585c48af1ba0ace0465ac755c7f22a9e6f30284266165f850e8f85af76157eea8136b2d6f79db02d3092

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\E4CC2D19-237D-4A0C-8DF0-9FA41C5F84E0

                                                                                                                                                        Filesize

                                                                                                                                                        174KB

                                                                                                                                                        MD5

                                                                                                                                                        f9d9400c061e707eb80276e59bb89b6e

                                                                                                                                                        SHA1

                                                                                                                                                        56e5f72f620ec04144a92e4c0e7f402830f75eac

                                                                                                                                                        SHA256

                                                                                                                                                        70073a8486e7b6ed5449fadba21bb4897a05d0687ae51ad6236292acb765af42

                                                                                                                                                        SHA512

                                                                                                                                                        8e314491de9531dc1ec20b60d335c5c0c3f600e594b5ad64ec23509a11113e2306762c1af28cc4d5ed56e56c31b114dd586f8175dec36dd7c210bea5b7c7c447

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

                                                                                                                                                        Filesize

                                                                                                                                                        322KB

                                                                                                                                                        MD5

                                                                                                                                                        54d4dea7e2c4f8d938e102f92f8b54bf

                                                                                                                                                        SHA1

                                                                                                                                                        eba36fcc8af405ef5acc9bab5c3dccfd32feed8f

                                                                                                                                                        SHA256

                                                                                                                                                        9fddf4af60e6e787452936f2ec778c7e0f1d4dcfed991c0543f9b8b8fbae7f69

                                                                                                                                                        SHA512

                                                                                                                                                        c4d6955962782ef602c173fe3b85eb5ad0dcfcf3768cdab6d44549ab7b8fc606bd49dbca8089139a3d63fc551e1a150b5df86e9dedbf2cff0a20c3e12e6a8282

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Office\OTele\excel.exe.db

                                                                                                                                                        Filesize

                                                                                                                                                        24KB

                                                                                                                                                        MD5

                                                                                                                                                        33eea2792b9fa42f418d9d609f692007

                                                                                                                                                        SHA1

                                                                                                                                                        48c3916a14ef2d9609ec4d2887a337b973cf8753

                                                                                                                                                        SHA256

                                                                                                                                                        8f7807c324626abc2d3504638958c148e2e3f3e212261f078940cf4c5f0c4fbb

                                                                                                                                                        SHA512

                                                                                                                                                        b2dbfcdf2599c38c966c5ebce714a5cd50e2f8b411555acf9f02b31b9c29b8ab53a9afa9d32bab87a06e08f8b2c7818d600773f659a058c8af81c50be7f09b95

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Office\OTele\excel.exe.db-wal

                                                                                                                                                        Filesize

                                                                                                                                                        8KB

                                                                                                                                                        MD5

                                                                                                                                                        c624c1d9361e40011090faab0fe37ebb

                                                                                                                                                        SHA1

                                                                                                                                                        ab7fff5e5cd2cd56524e59345d368a1a987c6285

                                                                                                                                                        SHA256

                                                                                                                                                        2dabe1c4b6edd1d559e801fd10ffe116495a2776859d4e00fec6d0d0009b1b65

                                                                                                                                                        SHA512

                                                                                                                                                        b737a31aec3ffc7fc4eb58933dd814920a31f6f81249ecf6c2da8e2d92d0ca616d5fdc2fb5c4a1e7a3894d966ec33cabb8daedce9cd8015fe9a3730c795bdf31

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Office\OTele\excel.exe.db-wal

                                                                                                                                                        Filesize

                                                                                                                                                        12KB

                                                                                                                                                        MD5

                                                                                                                                                        53fb40c78d702bb716ed23110bf9627c

                                                                                                                                                        SHA1

                                                                                                                                                        8e43e960b90f1b5d461d62546baeea5b79a71505

                                                                                                                                                        SHA256

                                                                                                                                                        1e6cc04fedb867e23ca5e1f5a4300751d6cef696c6b8e6650fc80974c09e8fc9

                                                                                                                                                        SHA512

                                                                                                                                                        4365531fe2375126e2d41e33b243fb7d5f385086784e5c875cd8440da50b559ddc8a6c656edd7e7d7284dd996b544c0ed11bd89ca6e3593869464725a8f22126

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Office\OTele\excel.exe.db-wal

                                                                                                                                                        Filesize

                                                                                                                                                        277KB

                                                                                                                                                        MD5

                                                                                                                                                        ff9af0d01e07c28650cbb31ff199c8b5

                                                                                                                                                        SHA1

                                                                                                                                                        c2b903018f3a0b11efea0503fcec58a9dfeee4d1

                                                                                                                                                        SHA256

                                                                                                                                                        ed97719c9129e279d80b33b25367633eff60aa5017faba04cae992c5254bbba9

                                                                                                                                                        SHA512

                                                                                                                                                        c0a0dc9d3539ef85b1beb8ef94d98f180b72f090f1abab1c512d9c98805610f5b4583586232c939bd47da01313bce643d7e7fa211803362ba9f320f0a8220bae

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Office\OTele\excel.exe.db-wal

                                                                                                                                                        Filesize

                                                                                                                                                        370KB

                                                                                                                                                        MD5

                                                                                                                                                        662ecad09f6068db94fe19eeb2ecf37c

                                                                                                                                                        SHA1

                                                                                                                                                        cfd48b93b927e0dde71dc9316b7530e3cac5ee36

                                                                                                                                                        SHA256

                                                                                                                                                        33f844a64eade103134748f56e5010a9248db8ced26069fe0b8ac042dd33133d

                                                                                                                                                        SHA512

                                                                                                                                                        00002ae7591096c86aff1a5651f72f35f72dfe5d9270593a51fecbbf307fadbbcd0f4b5ce68bf43f8b59df2892a031e4d063ce5474a53d9c52659472f70b84ff

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Office\OTele\excel.exe.db-wal

                                                                                                                                                        Filesize

                                                                                                                                                        12KB

                                                                                                                                                        MD5

                                                                                                                                                        9a81fb6e37e7ad09c1bfaf6eb5dafa34

                                                                                                                                                        SHA1

                                                                                                                                                        376d00981714a0de3737d6bb04f9fbb547e983cb

                                                                                                                                                        SHA256

                                                                                                                                                        d558cbce3c2a1170911e86a212c8f3ce28f64e02382aed707d9c0cedc832252b

                                                                                                                                                        SHA512

                                                                                                                                                        6430376f25735dd5e085d33a7be74a47ad02c7ff2802c97f465d3d8e36bb201429526d184b90f543823bd4efdb895afd46b0a09d85c134137c0c66b22c1110a4

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\49dbe2955480c7f6ef8cec9c4320c9868d9293fd.tbres

                                                                                                                                                        Filesize

                                                                                                                                                        2KB

                                                                                                                                                        MD5

                                                                                                                                                        ac9f84d2d7cfcd044feb628bf75198a2

                                                                                                                                                        SHA1

                                                                                                                                                        a67822611799fbc8d5a2404b196f660bbd0d656d

                                                                                                                                                        SHA256

                                                                                                                                                        698d3591131ebf6710710b5238517e6a42977ac3dbe7ad3b53d9c8c4b9fffe53

                                                                                                                                                        SHA512

                                                                                                                                                        4a7c57f89184e85ae3c43237f4e41340da18cfd33dffc4fbf8ace289e8f7d7939fd54e017f3fe80348c4441fdad081dce7933b52aefbb1503c59714cc60ada0c

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\49dbe2955480c7f6ef8cec9c4320c9868d9293fd.tbres

                                                                                                                                                        Filesize

                                                                                                                                                        2KB

                                                                                                                                                        MD5

                                                                                                                                                        ae7f7de194c6fd064a259084fbb9e151

                                                                                                                                                        SHA1

                                                                                                                                                        37ce2dbde7ccc852bb5685fa2dd34784d2c9a4e2

                                                                                                                                                        SHA256

                                                                                                                                                        b585a116ea81307ac37fe5df2ae4694582c6d423ffc9f69dc53873b48517356c

                                                                                                                                                        SHA512

                                                                                                                                                        e62e24f1ad7d8ad6f1e9e377622ab296aff20f2d4c668b814c4ae9e6363097d470e6265c09a8d9e0c8f8a4df9f547f625c3c789855c13576eedfd757db260670

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\9cd93bc6dcf544bae69531052e64647ec02f2bb4.tbres

                                                                                                                                                        Filesize

                                                                                                                                                        4KB

                                                                                                                                                        MD5

                                                                                                                                                        b709d8f75d689a4465ec5a024953f778

                                                                                                                                                        SHA1

                                                                                                                                                        5ebf3d6e821337efead810851371cb1c179df299

                                                                                                                                                        SHA256

                                                                                                                                                        629fb73de38ceb5cb8cfe4ac30aeade4397345080993998b27d7c7c44c23a095

                                                                                                                                                        SHA512

                                                                                                                                                        50d17ccc7d1922cd43cf60a6b6170cf2768fc15aa60fa74a4ec3667cb5f99864d8a6559d85dd61f1dffd6e629ec3ba438b14bdb2bd515672f7a4fe4cfd9a653c

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\e8ddd4cbd9c0504aace6ef7a13fa20d04fd52408.tbres

                                                                                                                                                        Filesize

                                                                                                                                                        2KB

                                                                                                                                                        MD5

                                                                                                                                                        9168cd698dcef84fbc8e39b1a3bd878d

                                                                                                                                                        SHA1

                                                                                                                                                        dec83b20173c9ba24be00b79183f8a843bbc3696

                                                                                                                                                        SHA256

                                                                                                                                                        a2dfca6adec106aedae6937df3e5bd55cd57b51272064137e9d85b34f8fb817f

                                                                                                                                                        SHA512

                                                                                                                                                        2945107e2379130530409aa2b63578f9325eee741fa806aa6619eec335b694a3c0a1425bf0dee0aa0b60d089a33715cb6066e895c2ee30a65200b31608fa8bd1

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML.bak

                                                                                                                                                        Filesize

                                                                                                                                                        9KB

                                                                                                                                                        MD5

                                                                                                                                                        7050d5ae8acfbe560fa11073fef8185d

                                                                                                                                                        SHA1

                                                                                                                                                        5bc38e77ff06785fe0aec5a345c4ccd15752560e

                                                                                                                                                        SHA256

                                                                                                                                                        cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

                                                                                                                                                        SHA512

                                                                                                                                                        a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\8TO9EJAY\suggestions[1].en-US

                                                                                                                                                        Filesize

                                                                                                                                                        17KB

                                                                                                                                                        MD5

                                                                                                                                                        5a34cb996293fde2cb7a4ac89587393a

                                                                                                                                                        SHA1

                                                                                                                                                        3c96c993500690d1a77873cd62bc639b3a10653f

                                                                                                                                                        SHA256

                                                                                                                                                        c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

                                                                                                                                                        SHA512

                                                                                                                                                        e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

                                                                                                                                                        Filesize

                                                                                                                                                        1KB

                                                                                                                                                        MD5

                                                                                                                                                        f399e9faba27b0a4c46f04f95c9a38f7

                                                                                                                                                        SHA1

                                                                                                                                                        a7950d8b7a23c714814d828f62adf32015c4e40c

                                                                                                                                                        SHA256

                                                                                                                                                        7c0781147cf67e49e01d5db24a6701dcb7e7c9dd03581316fcea999245557b90

                                                                                                                                                        SHA512

                                                                                                                                                        3e43888af07a3b5a65f4587601394ce6d8563623aecd01ff4a93c2b283bf6fcf7ab12a75604998dfe4a5e1631bb749ab41d2367e834f4fe9dd94a88c5d1c3ac6

                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms

                                                                                                                                                        Filesize

                                                                                                                                                        3KB

                                                                                                                                                        MD5

                                                                                                                                                        b9daee2f15e369a60b746ab15c0a3743

                                                                                                                                                        SHA1

                                                                                                                                                        21a5aa4ef0f099df12f30fc7dd77f7cdff51ac83

                                                                                                                                                        SHA256

                                                                                                                                                        f7098767138a8cfc82e5dcb73f57b1d2c94548eda574856c473e755ab97a4437

                                                                                                                                                        SHA512

                                                                                                                                                        a12db24f6f8c14f23d07c01c311b08aa5d585a9a435b03bf791656cd716fe6066d03cf07bf50e9c29fdef724bf900b5cfca93f0660150ea79025957bde06bf0c

                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms

                                                                                                                                                        Filesize

                                                                                                                                                        3KB

                                                                                                                                                        MD5

                                                                                                                                                        b3f3e4d6275d4e5ad9f386d28f340a38

                                                                                                                                                        SHA1

                                                                                                                                                        5ed326a5dc622c6d4232b9f83a46b6df940f6560

                                                                                                                                                        SHA256

                                                                                                                                                        4f462bc7ead45c8a28b66406d253c9c913d1f5af3fe9abfa1e1b7f7e7ca17dc8

                                                                                                                                                        SHA512

                                                                                                                                                        42a90eb84f99baf115df53e752da46fe05010610d0b05693ae17a58a9bb73e01fdc49355f83eb847e0bf150798c8f6c3996a46c6f06fcd6d1ba9caf5d53374b5

                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\SubDir\Client.exe

                                                                                                                                                        Filesize

                                                                                                                                                        3.1MB

                                                                                                                                                        MD5

                                                                                                                                                        f5b93af3ee1b64dacd2bac9ba4af9b27

                                                                                                                                                        SHA1

                                                                                                                                                        1f2a038199a71a2b917dca4dff2f5fac5e840978

                                                                                                                                                        SHA256

                                                                                                                                                        48d4fde21b28f0614fdf124f83f5594bddc13292f21b775da58b017385a49b01

                                                                                                                                                        SHA512

                                                                                                                                                        83703b0f567723abe3d6b34bd419be5df3475e049ae8893993fec017da9a420cd875184c570bdffbfc0bccac662762991885dea8ebcc2af172b3aac2fb00a302

                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\vlc\vlc-qt-interface.ini.qz5476

                                                                                                                                                        Filesize

                                                                                                                                                        83B

                                                                                                                                                        MD5

                                                                                                                                                        adca9615a55298c9d937bfa6bfcba9bf

                                                                                                                                                        SHA1

                                                                                                                                                        b5e9eafe07ff6fc2f3e4c4ef41f87e4810e38610

                                                                                                                                                        SHA256

                                                                                                                                                        070302a4247c1ca7956a5e8accbdfec391563b0310073007b8c7fe6d3391b294

                                                                                                                                                        SHA512

                                                                                                                                                        9075e229df459ab2523b9039493463be5c6583f907b27ca836de709fea67ab3d3508e88bbbd9a738b1ec49a6d144005a477ddb43337c883dfb02cbcdfe6d1f12

                                                                                                                                                      • C:\Windows\Debug\WIA\wiatrace.log

                                                                                                                                                        Filesize

                                                                                                                                                        26KB

                                                                                                                                                        MD5

                                                                                                                                                        f58706a9bf9f85945cab5f0bd39073d1

                                                                                                                                                        SHA1

                                                                                                                                                        c072deb9f21cefa0f5a3aeaecc053442c314dc75

                                                                                                                                                        SHA256

                                                                                                                                                        8b2306ca77fd56f39a23af942c1f864d18823d57395f85a977feca0cfabe33b7

                                                                                                                                                        SHA512

                                                                                                                                                        790fec102545fa2c2f67e6bcbd8c8fe801597476f0303bc5020c0c7305e5cc5df910cfb77685e2112e4676af868ed2bdc4f954d52c08ca8409f29343e47eefe9

                                                                                                                                                      • C:\Windows\Debug\WIA\wiatrace.log

                                                                                                                                                        Filesize

                                                                                                                                                        29KB

                                                                                                                                                        MD5

                                                                                                                                                        4abe3b5ccb80744af0105266c1405c28

                                                                                                                                                        SHA1

                                                                                                                                                        413cee65b772ab04d3bee443f92585eca5957247

                                                                                                                                                        SHA256

                                                                                                                                                        1a4542ec15b301f73d535fba0f7961600a7ddaee3d5682ad1dd351cc7bde56f7

                                                                                                                                                        SHA512

                                                                                                                                                        514bd01cce4cc465dcb3a1f9c70183cb43fee2445fd311eb9c058ab71a15f1d35a8aa0b762247b0b0188de90d3d22a928777d942ef6c9b222d73260d8c354920

                                                                                                                                                      • C:\Windows\Debug\WIA\wiatrace.log

                                                                                                                                                        Filesize

                                                                                                                                                        30KB

                                                                                                                                                        MD5

                                                                                                                                                        8788e60f53ae282dc189bb1579992f9e

                                                                                                                                                        SHA1

                                                                                                                                                        e975fcf4e6ecc4f819e13ffd8187e2c89cc637b6

                                                                                                                                                        SHA256

                                                                                                                                                        1a3dc59aebe6d2e5be3317712339b408f486d60081e2339e037958247e9285b3

                                                                                                                                                        SHA512

                                                                                                                                                        e78cfe841064d0c1b2a7674bbf4fb39df929e017a65ec1e29a31a400748dbdfbb7469c0fcc23423da5d11cac27a8daf7f3048e28c0f4f07d85f412d0d7b5239c

                                                                                                                                                      • C:\Windows\Debug\WIA\wiatrace.log

                                                                                                                                                        Filesize

                                                                                                                                                        35KB

                                                                                                                                                        MD5

                                                                                                                                                        09ab35a4e8f3e8dc0ffe9650f4fbec76

                                                                                                                                                        SHA1

                                                                                                                                                        54bf94f0b91fabf40b71071dbc8afa8addf229f3

                                                                                                                                                        SHA256

                                                                                                                                                        2cfc5ee3ae231ac778a0e048219040342060a49d6b63e7019e33e62a394eedc4

                                                                                                                                                        SHA512

                                                                                                                                                        a36dc02961e1c444c7883e008a28f57d2786006adf72254ea0b73be400f472545271033d208539dcd21c06e35d2802143c48962ebdbfd90596f7ced990ca71bc

                                                                                                                                                      • C:\Windows\Debug\WIA\wiatrace.log

                                                                                                                                                        Filesize

                                                                                                                                                        4KB

                                                                                                                                                        MD5

                                                                                                                                                        f031391a86e7784a69481f9f66c8c44c

                                                                                                                                                        SHA1

                                                                                                                                                        5a8bb1c826b1979f9a2433ac4a6a5ded57648319

                                                                                                                                                        SHA256

                                                                                                                                                        752b90b9ee5d110818b40163def5f07be47050559d003da1e72b7162fe5dafca

                                                                                                                                                        SHA512

                                                                                                                                                        e382ef21c9c4dbd22af71c8feb4678ccefc762a67c9d786515851b4996525589dfaf8d46255b90a32c2d949873b1fc85d3441bd58c720b53fd668e00aefd6cfb

                                                                                                                                                      • C:\Windows\Debug\WIA\wiatrace.log

                                                                                                                                                        Filesize

                                                                                                                                                        6KB

                                                                                                                                                        MD5

                                                                                                                                                        998185b6cc453a7e0e47be85b199e4a6

                                                                                                                                                        SHA1

                                                                                                                                                        807d999c392ff689130df1cb2f5c40def8312832

                                                                                                                                                        SHA256

                                                                                                                                                        6471d2051765992e8a72ac820f71257b2c59fd9c3d395db0bc777c060cafbc86

                                                                                                                                                        SHA512

                                                                                                                                                        25afa540b806d98eae7fa6b391a307c1e807bc554953f6f3ad33a1664542db6793b5abf2170ff8ecb78372ca0c1c11e0ec123a8164123a2573ee9c0e02b5a13e

                                                                                                                                                      • C:\Windows\Debug\WIA\wiatrace.log

                                                                                                                                                        Filesize

                                                                                                                                                        38KB

                                                                                                                                                        MD5

                                                                                                                                                        06f0d8e41a4f86ba61ed6c2738abc468

                                                                                                                                                        SHA1

                                                                                                                                                        511109598362f91db92710986c0f84dc35e2e0da

                                                                                                                                                        SHA256

                                                                                                                                                        f1a3e8af2871396da85612f055600b109a391cbd1921264f8aece4fd43a1f619

                                                                                                                                                        SHA512

                                                                                                                                                        b6ea26d538ffb786b5087def69be3e5ffde5d7df2d8412a3cbb37551b09a86c66c1dc53f3693e6d9181e3b8517b64ad595891ade55b0bcfe3cb55440cba89e99

                                                                                                                                                      • C:\Windows\Debug\WIA\wiatrace.log

                                                                                                                                                        Filesize

                                                                                                                                                        40KB

                                                                                                                                                        MD5

                                                                                                                                                        8c11e12eae82b4fb87a69d77a865961a

                                                                                                                                                        SHA1

                                                                                                                                                        16f7ebd7b4a5ffc1ba412532c169ab1b534d094b

                                                                                                                                                        SHA256

                                                                                                                                                        aef8e3f9c58f1fd2317d30edb0f7184a2c0c56efd3951680cbe596c5493366d3

                                                                                                                                                        SHA512

                                                                                                                                                        3d1063702398568360c2d82882b23afb0df31afbcf6501f203337a02d6f8d0c8a2292f6aec9ca46a2da82327c99d6b6a6317273e3fba5ea45db4141feda51cd4

                                                                                                                                                      • C:\Windows\Debug\WIA\wiatrace.log

                                                                                                                                                        Filesize

                                                                                                                                                        9KB

                                                                                                                                                        MD5

                                                                                                                                                        39d4d4b166fd6cb3a5a08bb93ac7f630

                                                                                                                                                        SHA1

                                                                                                                                                        915e24185fe056a57f0620b51904da9bacc02d6c

                                                                                                                                                        SHA256

                                                                                                                                                        9e41455193f900c1b5e4c509e362711470e9ccd3ca5ca8ea2121b638a2df91d2

                                                                                                                                                        SHA512

                                                                                                                                                        b95de2d8af4f410eabf32401c07dab5872162c4d8d6fc98ec59bc5ae05effb0cc34d7d02cb1a25e45adc9f4445fbf5aec31dd4c248b07ae65d1f4e826bdee75d

                                                                                                                                                      • C:\Windows\Debug\WIA\wiatrace.log

                                                                                                                                                        Filesize

                                                                                                                                                        43KB

                                                                                                                                                        MD5

                                                                                                                                                        4d542926bbf7594ac29390e7c8df32fe

                                                                                                                                                        SHA1

                                                                                                                                                        a6514b0c901b99a159b2a970fe8dcd46ddf77ca0

                                                                                                                                                        SHA256

                                                                                                                                                        c548f274c60cc602da5d536979ed7d51c3b4007d9e1ace324bb726a94d872668

                                                                                                                                                        SHA512

                                                                                                                                                        3b8a124c1038166f60a701331dbf33ec61a4f8e9e1617195c4d3bcf72ad2f486adb8d94759f5f4e1e6a4ffb41df347e9a28ff32a5a9a43ef9246484c21a12e52

                                                                                                                                                      • C:\Windows\Debug\WIA\wiatrace.log

                                                                                                                                                        Filesize

                                                                                                                                                        44KB

                                                                                                                                                        MD5

                                                                                                                                                        d07298a7ac30cf3229d0695b109bcfee

                                                                                                                                                        SHA1

                                                                                                                                                        fc9f8e164f0a03fcbf7b70e5606baedb6b1e11bf

                                                                                                                                                        SHA256

                                                                                                                                                        66ce1f37fc64d819f56a4b1c92eb4834a146ed364363dd67888b4e7753398b40

                                                                                                                                                        SHA512

                                                                                                                                                        0dc176cf47c7e43b162621cb04735a832e70bb6fddf4f9a64863b2103162164284804f9d583b9afe1ce69221f1feeca0208068b9160312a7cc9c114fb14955b2

                                                                                                                                                      • C:\Windows\Debug\WIA\wiatrace.log

                                                                                                                                                        Filesize

                                                                                                                                                        46KB

                                                                                                                                                        MD5

                                                                                                                                                        975bb2aa313b2551dd346c502af9e3a0

                                                                                                                                                        SHA1

                                                                                                                                                        2dae95e750a712e1aa8ad2272fe20969acd9e4a0

                                                                                                                                                        SHA256

                                                                                                                                                        323ed9db6e15bc3183447f6d67ecac59eb734da460e0a6676ed76ab5ec370cbc

                                                                                                                                                        SHA512

                                                                                                                                                        34ba02e85ec4a68f8ad5e7c1468fa82673cb0d0e129404437bbc1569d1f9751d0c3837651dbd5936baecd13930f4e6ffaf0257fa07df3950954006d479328ebb

                                                                                                                                                      • C:\Windows\Debug\WIA\wiatrace.log

                                                                                                                                                        Filesize

                                                                                                                                                        23KB

                                                                                                                                                        MD5

                                                                                                                                                        3982e9da4c4e3cd94e9777a17db3838b

                                                                                                                                                        SHA1

                                                                                                                                                        48b3a62b276ad3316595e0ff031779bf284c498f

                                                                                                                                                        SHA256

                                                                                                                                                        7f8868d164483ca5c3042b1062faa88676a2e6fca936b96b82deeff1c9e04d8a

                                                                                                                                                        SHA512

                                                                                                                                                        d9445429ee79e5540f9d579575c3e134e26799623dc719b77ee654fc49bfab3240381eab2a7da45a5e6781aa1c142d8577ac0e183e648fa5ef18b6484eacb32f

                                                                                                                                                      • C:\Windows\Debug\WIA\wiatrace.log

                                                                                                                                                        Filesize

                                                                                                                                                        47KB

                                                                                                                                                        MD5

                                                                                                                                                        521a6f9050aca369a4a283b3d4e65546

                                                                                                                                                        SHA1

                                                                                                                                                        7cb674fc54346567c05de6aa61e9111993458e72

                                                                                                                                                        SHA256

                                                                                                                                                        408d02f47e6004394b05ab724238ef370f9a23748487a237f3c09e3ac26948e9

                                                                                                                                                        SHA512

                                                                                                                                                        6b1b3ec4323a8c0b3fbb67dd2c68264caf7a160816069850dc806f7a7144941df9d6f082450c498740b2ac559b816908cbeab193e651db4f1191559cff9622d8

                                                                                                                                                      • C:\Windows\Debug\WIA\wiatrace.log

                                                                                                                                                        Filesize

                                                                                                                                                        49KB

                                                                                                                                                        MD5

                                                                                                                                                        da544cd03653a8e30fc67b1a39b0ab02

                                                                                                                                                        SHA1

                                                                                                                                                        d902440455c8219385444bb55197525303dcfb9c

                                                                                                                                                        SHA256

                                                                                                                                                        037d2b45554ed23501533a39a8f9b122eea8c2c52c4395a20d11658552f8fc75

                                                                                                                                                        SHA512

                                                                                                                                                        b6e59821165c5f6ff9bef4b5f99be6ff3728e24a62368b38e56ac537b9fc026e159199ae030244897ed0c6cf974d45ae517eefa07d29cec0d50fc3bc00db80e6

                                                                                                                                                      • C:\Windows\Debug\WIA\wiatrace.log

                                                                                                                                                        Filesize

                                                                                                                                                        50KB

                                                                                                                                                        MD5

                                                                                                                                                        d9ee46616e066635d4db4e359c0e62ff

                                                                                                                                                        SHA1

                                                                                                                                                        a1e106914e29c51cf96d8d39cb686a60c26f976a

                                                                                                                                                        SHA256

                                                                                                                                                        b21ba3907168b5ee13c2e7f0d830506bb51d981d0d7a5abe531e8f6e47632053

                                                                                                                                                        SHA512

                                                                                                                                                        eb90527bdef325ccb0d23901931feb3666887823fabf5ea9134aba1ff4940225ac04770a33b0eabe14ee399dd8babf5edb729a32e2c4c33f0fda381462e07e58

                                                                                                                                                      • C:\Windows\debug\WIA\wiatrace.log

                                                                                                                                                        Filesize

                                                                                                                                                        20KB

                                                                                                                                                        MD5

                                                                                                                                                        d4be7103ed6ccbf5d8beda1ae348890f

                                                                                                                                                        SHA1

                                                                                                                                                        6148af3c1aef1dcd3e354a75b6dede32ebc33af8

                                                                                                                                                        SHA256

                                                                                                                                                        0ab8bb17aeafd55e43c97ac5954b2034723331792120569adb3e1d02c76e9958

                                                                                                                                                        SHA512

                                                                                                                                                        a20ef5b41dc041d692512c072a1af92f7e87833069619caf9744fed366738562809b9cae49bab6861ea322c9cca3268872fd997a451fce2bb08b58c46eb22eb1

                                                                                                                                                      • \??\pipe\LOCAL\crashpad_3700_PSJVHIANNNVDIPHO

                                                                                                                                                        MD5

                                                                                                                                                        d41d8cd98f00b204e9800998ecf8427e

                                                                                                                                                        SHA1

                                                                                                                                                        da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                                                                                                        SHA256

                                                                                                                                                        e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                                                                                                        SHA512

                                                                                                                                                        cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                                                                                                                      • memory/880-117-0x00000000055B0000-0x00000000055C0000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        64KB

                                                                                                                                                      • memory/880-103-0x0000000007AE0000-0x0000000007AF0000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        64KB

                                                                                                                                                      • memory/880-119-0x00000000055B0000-0x00000000055C0000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        64KB

                                                                                                                                                      • memory/880-118-0x00000000055B0000-0x00000000055C0000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        64KB

                                                                                                                                                      • memory/880-124-0x00000000055B0000-0x00000000055C0000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        64KB

                                                                                                                                                      • memory/880-123-0x00000000055B0000-0x00000000055C0000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        64KB

                                                                                                                                                      • memory/880-122-0x00000000055B0000-0x00000000055C0000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        64KB

                                                                                                                                                      • memory/2516-6-0x00007FF9D2770000-0x00007FF9D3232000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        10.8MB

                                                                                                                                                      • memory/2516-0-0x00007FF9D2773000-0x00007FF9D2775000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        8KB

                                                                                                                                                      • memory/2516-2-0x00007FF9D2770000-0x00007FF9D3232000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        10.8MB

                                                                                                                                                      • memory/2516-1-0x0000000000C40000-0x0000000000F64000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        3.1MB

                                                                                                                                                      • memory/4724-112-0x00007FF9AE910000-0x00007FF9AE920000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        64KB

                                                                                                                                                      • memory/4724-109-0x00007FF9B0C50000-0x00007FF9B0C60000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        64KB

                                                                                                                                                      • memory/4724-108-0x00007FF9B0C50000-0x00007FF9B0C60000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        64KB

                                                                                                                                                      • memory/4724-105-0x00007FF9B0C50000-0x00007FF9B0C60000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        64KB

                                                                                                                                                      • memory/4724-106-0x00007FF9B0C50000-0x00007FF9B0C60000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        64KB

                                                                                                                                                      • memory/4724-107-0x00007FF9B0C50000-0x00007FF9B0C60000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        64KB

                                                                                                                                                      • memory/4724-121-0x00007FF9AE910000-0x00007FF9AE920000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        64KB

                                                                                                                                                      • memory/4936-32-0x000000001DC50000-0x000000001DDF7000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        1.7MB

                                                                                                                                                      • memory/4936-19-0x000000001DC50000-0x000000001DDF7000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        1.7MB

                                                                                                                                                      • memory/4936-38-0x000000001ED90000-0x0000000020C67000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        30.8MB

                                                                                                                                                      • memory/4936-48-0x000000001DC50000-0x000000001DDF7000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        1.7MB

                                                                                                                                                      • memory/4936-74-0x000000001DC50000-0x000000001DDF7000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        1.7MB

                                                                                                                                                      • memory/4936-30-0x000000001DC50000-0x000000001DDF7000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        1.7MB

                                                                                                                                                      • memory/4936-29-0x000000001DC50000-0x000000001DDF7000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        1.7MB

                                                                                                                                                      • memory/4936-28-0x000000001DC50000-0x000000001DDF7000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        1.7MB

                                                                                                                                                      • memory/4936-27-0x000000001DC50000-0x000000001DDF7000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        1.7MB

                                                                                                                                                      • memory/4936-26-0x000000001DC50000-0x000000001DDF7000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        1.7MB

                                                                                                                                                      • memory/4936-25-0x000000001DC50000-0x000000001DDF7000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        1.7MB

                                                                                                                                                      • memory/4936-24-0x000000001DC50000-0x000000001DDF7000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        1.7MB

                                                                                                                                                      • memory/4936-23-0x000000001DC50000-0x000000001DDF7000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        1.7MB

                                                                                                                                                      • memory/4936-22-0x000000001DC50000-0x000000001DDF7000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        1.7MB

                                                                                                                                                      • memory/4936-21-0x000000001DC50000-0x000000001DDF7000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        1.7MB

                                                                                                                                                      • memory/4936-50-0x000000001DC50000-0x000000001DDF7000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        1.7MB

                                                                                                                                                      • memory/4936-52-0x000000001DC50000-0x000000001DDF7000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        1.7MB

                                                                                                                                                      • memory/4936-54-0x000000001DC50000-0x000000001DDF7000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        1.7MB

                                                                                                                                                      • memory/4936-20-0x000000001DC50000-0x000000001DDF7000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        1.7MB

                                                                                                                                                      • memory/4936-37-0x000000001DC50000-0x000000001DDF7000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        1.7MB

                                                                                                                                                      • memory/4936-18-0x000000001DC50000-0x000000001DDF7000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        1.7MB

                                                                                                                                                      • memory/4936-17-0x000000001DC50000-0x000000001DDF7000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        1.7MB

                                                                                                                                                      • memory/4936-56-0x000000001DC50000-0x000000001DDF7000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        1.7MB

                                                                                                                                                      • memory/4936-16-0x000000001DC50000-0x000000001DDF7000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        1.7MB

                                                                                                                                                      • memory/4936-15-0x000000001DC50000-0x000000001DDF7000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        1.7MB

                                                                                                                                                      • memory/4936-58-0x000000001DC50000-0x000000001DDF7000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        1.7MB

                                                                                                                                                      • memory/4936-14-0x00007FF9D2770000-0x00007FF9D3232000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        10.8MB

                                                                                                                                                      • memory/4936-13-0x000000001D1F0000-0x000000001D22C000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        240KB

                                                                                                                                                      • memory/4936-12-0x000000001D190000-0x000000001D1A2000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        72KB

                                                                                                                                                      • memory/4936-60-0x000000001DC50000-0x000000001DDF7000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        1.7MB

                                                                                                                                                      • memory/4936-9-0x000000001D250000-0x000000001D302000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        712KB

                                                                                                                                                      • memory/4936-8-0x000000001D140000-0x000000001D190000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        320KB

                                                                                                                                                      • memory/4936-62-0x000000001DC50000-0x000000001DDF7000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        1.7MB

                                                                                                                                                      • memory/4936-64-0x000000001DC50000-0x000000001DDF7000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        1.7MB

                                                                                                                                                      • memory/4936-7-0x00007FF9D2770000-0x00007FF9D3232000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        10.8MB

                                                                                                                                                      • memory/4936-66-0x000000001DC50000-0x000000001DDF7000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        1.7MB

                                                                                                                                                      • memory/4936-5-0x00007FF9D2770000-0x00007FF9D3232000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        10.8MB

                                                                                                                                                      • memory/4936-68-0x000000001DC50000-0x000000001DDF7000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        1.7MB

                                                                                                                                                      • memory/4936-70-0x000000001DC50000-0x000000001DDF7000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        1.7MB