Resubmissions

13/01/2025, 20:29

250113-y9mawswray 10

13/01/2025, 20:26

250113-y76azsyqcn 10

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/01/2025, 20:29

General

  • Target

    https://gofile.io/d/nEXvhI

Malware Config

Extracted

Family

revengerat

Botnet

Guest

C2

0.tcp.ngrok.io:19521

Mutex

RV_MUTEX

Signatures

  • RevengeRAT

    Remote-access trojan with a wide range of capabilities.

  • Revengerat family
  • RevengeRat Executable 1 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 40 IoCs
  • Modifies system executable filetype association 2 TTPs 7 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
  • Checks system information in the registry 2 TTPs 6 IoCs

    System information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Accessibility Features 1 TTPs

    Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 10 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 44 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 45 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://gofile.io/d/nEXvhI
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:5084
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe72d046f8,0x7ffe72d04708,0x7ffe72d04718
      2⤵
        PID:3916
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,340606550736863070,7135867577492214669,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:2
        2⤵
          PID:4668
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,340606550736863070,7135867577492214669,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2584 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2852
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,340606550736863070,7135867577492214669,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:8
          2⤵
            PID:412
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,340606550736863070,7135867577492214669,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:1
            2⤵
              PID:4048
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,340606550736863070,7135867577492214669,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:1
              2⤵
                PID:4488
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,340606550736863070,7135867577492214669,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4608 /prefetch:1
                2⤵
                  PID:788
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,340606550736863070,7135867577492214669,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4952 /prefetch:8
                  2⤵
                    PID:2564
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,340606550736863070,7135867577492214669,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4952 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:1916
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,340606550736863070,7135867577492214669,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:1
                    2⤵
                      PID:4996
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,340606550736863070,7135867577492214669,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:1
                      2⤵
                        PID:4888
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,340606550736863070,7135867577492214669,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:1
                        2⤵
                          PID:1368
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,340606550736863070,7135867577492214669,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5600 /prefetch:1
                          2⤵
                            PID:1928
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,340606550736863070,7135867577492214669,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:1
                            2⤵
                              PID:3480
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2056,340606550736863070,7135867577492214669,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4752 /prefetch:8
                              2⤵
                                PID:2304
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,340606550736863070,7135867577492214669,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:1
                                2⤵
                                  PID:4340
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2056,340606550736863070,7135867577492214669,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6176 /prefetch:8
                                  2⤵
                                    PID:4564
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2056,340606550736863070,7135867577492214669,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5368 /prefetch:8
                                    2⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:4572
                                  • C:\Users\Admin\Downloads\Rc7.exe
                                    "C:\Users\Admin\Downloads\Rc7.exe"
                                    2⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetThreadContext
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1996
                                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                      3⤵
                                      • Drops startup file
                                      • Suspicious use of SetThreadContext
                                      • NTFS ADS
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:5188
                                      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                        4⤵
                                          PID:5216
                                        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\guyqqijd.cmdline"
                                          4⤵
                                            PID:3028
                                            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                                              C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES999B.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcC384483833F4DF18FF73C71B0A864B0.TMP"
                                              5⤵
                                                PID:5684
                                            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                              "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\sfbypccn.cmdline"
                                              4⤵
                                              • System Location Discovery: System Language Discovery
                                              PID:2288
                                              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                                                C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9B9F.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc6D45A12E1F2949EA8F2A222369436281.TMP"
                                                5⤵
                                                  PID:5396
                                              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\minymsgu.cmdline"
                                                4⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:4884
                                                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                                                  C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9FB6.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcAF1CC0CFACD64DD7B5406452F7702697.TMP"
                                                  5⤵
                                                    PID:3148
                                                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                  "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\6bbqwvcn.cmdline"
                                                  4⤵
                                                    PID:3564
                                                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                                                      C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA1D9.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcEE65B446512948BA85C915EC376B1FD.TMP"
                                                      5⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:6004
                                                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                    "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\xb3_-n5q.cmdline"
                                                    4⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:1088
                                                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                                                      C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA43A.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc3A9E166CAB934D548A421A299D73CA5.TMP"
                                                      5⤵
                                                        PID:5604
                                                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\wijx0ezh.cmdline"
                                                      4⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:5304
                                                      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                                                        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA5A1.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcAA16FC575D5F4A9B84F39AC3B820873D.TMP"
                                                        5⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:5076
                                                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\5g6wiolj.cmdline"
                                                      4⤵
                                                        PID:5828
                                                        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                                                          C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA62E.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc932369D0969A4B22BE5C7B166C495B2C.TMP"
                                                          5⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:3472
                                                      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\gdasn8g-.cmdline"
                                                        4⤵
                                                          PID:1692
                                                          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                                                            C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA6AB.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc77B2AA625C70486B85243A4D565413C6.TMP"
                                                            5⤵
                                                              PID:3356
                                                          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\oqyrww7m.cmdline"
                                                            4⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:5400
                                                            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                                                              C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA738.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcA24916AFDC87446D93894DE2B6E1D12B.TMP"
                                                              5⤵
                                                                PID:6124
                                                            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                              "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\fuaf0qhe.cmdline"
                                                              4⤵
                                                                PID:6116
                                                                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                                                                  C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA7A5.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcA1FB2064497F425682C376F3FC59BA1A.TMP"
                                                                  5⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:5244
                                                              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\5qhcshzh.cmdline"
                                                                4⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:5332
                                                                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                                                                  C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA851.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc569A006BDC8E4E449566A4C34027E42A.TMP"
                                                                  5⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:5852
                                                              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\6gj4t4nx.cmdline"
                                                                4⤵
                                                                  PID:880
                                                                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                                                                    C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA8ED.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc1521329A5AE841B2AF1D97AA4AC3396C.TMP"
                                                                    5⤵
                                                                      PID:3800
                                                                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                                    "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\l69eo_xd.cmdline"
                                                                    4⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:4016
                                                                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                                                                      C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESA97A.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc3ABD118F609C4154AFE77824C6267C26.TMP"
                                                                      5⤵
                                                                        PID:4028
                                                                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                                      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\r8lpdtuj.cmdline"
                                                                      4⤵
                                                                        PID:5996
                                                                        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                                                                          C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAA06.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcB10D968D3479457296B499B4F8F9DCEF.TMP"
                                                                          5⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:224
                                                                      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                                        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\oplkjz5v.cmdline"
                                                                        4⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:5148
                                                                        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                                                                          C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAAA3.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc9CF2DF8DF4D444BEB3B4314B9E8725D4.TMP"
                                                                          5⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:5720
                                                                      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                                        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\tx3lmdho.cmdline"
                                                                        4⤵
                                                                          PID:5196
                                                                          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                                                                            C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAB20.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcCB18B2ACD0F4439AB53CB791626E35A1.TMP"
                                                                            5⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:5672
                                                                        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                                          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\hcyaxkrq.cmdline"
                                                                          4⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:5584
                                                                          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                                                                            C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESABFA.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc3FF9E2702CB240B0A34433EA1EE38C9F.TMP"
                                                                            5⤵
                                                                              PID:4208
                                                                          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                                            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\jiy9m5v4.cmdline"
                                                                            4⤵
                                                                              PID:5304
                                                                              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                                                                                C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESACB6.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcE5D9DA005D4E4D33A1F6839B663A90.TMP"
                                                                                5⤵
                                                                                  PID:5972
                                                                              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                                                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\4sd9aivb.cmdline"
                                                                                4⤵
                                                                                  PID:5632
                                                                                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                                                                                    C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAD52.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcF6106D1A497D48A9B8D14AAFE17FCD2.TMP"
                                                                                    5⤵
                                                                                      PID:2428
                                                                                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                                                    "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\llbsvtyp.cmdline"
                                                                                    4⤵
                                                                                      PID:1140
                                                                                      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                                                                                        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESADFE.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc760C832E6DD9481AA753DFF7B8A6252.TMP"
                                                                                        5⤵
                                                                                          PID:5460
                                                                                      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                                                                                        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\eo-rykwy.cmdline"
                                                                                        4⤵
                                                                                          PID:1180
                                                                                          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
                                                                                            C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESAED9.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc5A91041CE106494C9C676BDA831AD4C.TMP"
                                                                                            5⤵
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:4524
                                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe
                                                                                          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe"
                                                                                          4⤵
                                                                                          • Executes dropped EXE
                                                                                          PID:7600
                                                                                          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                            5⤵
                                                                                              PID:8288
                                                                                              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                6⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:8368
                                                                                      • C:\Users\Admin\Downloads\Rc7.exe
                                                                                        "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                        2⤵
                                                                                        • Executes dropped EXE
                                                                                        • Suspicious use of SetThreadContext
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:5388
                                                                                        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                          3⤵
                                                                                          • Suspicious use of SetThreadContext
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          PID:5420
                                                                                          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                            4⤵
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:5452
                                                                                      • C:\Users\Admin\Downloads\Rc7.exe
                                                                                        "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                        2⤵
                                                                                        • Executes dropped EXE
                                                                                        • Suspicious use of SetThreadContext
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:5564
                                                                                        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                          3⤵
                                                                                          • Suspicious use of SetThreadContext
                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                          PID:5596
                                                                                          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                            4⤵
                                                                                              PID:5624
                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,340606550736863070,7135867577492214669,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5984 /prefetch:1
                                                                                          2⤵
                                                                                            PID:5868
                                                                                          • C:\Users\Admin\Downloads\Rc7.exe
                                                                                            "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                            2⤵
                                                                                            • Executes dropped EXE
                                                                                            • Suspicious use of SetThreadContext
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:5956
                                                                                            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                              "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                              3⤵
                                                                                              • Suspicious use of SetThreadContext
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:5992
                                                                                              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                4⤵
                                                                                                  PID:6020
                                                                                            • C:\Users\Admin\Downloads\Rc7.exe
                                                                                              "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                              2⤵
                                                                                              • Executes dropped EXE
                                                                                              • Suspicious use of SetThreadContext
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:6112
                                                                                              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                3⤵
                                                                                                • Suspicious use of SetThreadContext
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:3388
                                                                                                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                  "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                  4⤵
                                                                                                    PID:1140
                                                                                              • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                2⤵
                                                                                                • Executes dropped EXE
                                                                                                • Suspicious use of SetThreadContext
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                PID:4964
                                                                                                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                  "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                  3⤵
                                                                                                  • Suspicious use of SetThreadContext
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:5360
                                                                                                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                    "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                    4⤵
                                                                                                      PID:5600
                                                                                                • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                  "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                  2⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Suspicious use of SetThreadContext
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:5140
                                                                                                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                    "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                    3⤵
                                                                                                    • Suspicious use of SetThreadContext
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:5384
                                                                                                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                      4⤵
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      PID:5532
                                                                                                • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                  "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                  2⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Suspicious use of SetThreadContext
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:5196
                                                                                                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                    "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                    3⤵
                                                                                                    • Suspicious use of SetThreadContext
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:5496
                                                                                                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                      4⤵
                                                                                                        PID:5612
                                                                                                  • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                    "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                    2⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Suspicious use of SetThreadContext
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:5240
                                                                                                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                      3⤵
                                                                                                      • Suspicious use of SetThreadContext
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:5504
                                                                                                      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                        4⤵
                                                                                                          PID:5456
                                                                                                    • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                      "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                      2⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Suspicious use of SetThreadContext
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:1804
                                                                                                      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                        3⤵
                                                                                                        • Suspicious use of SetThreadContext
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:5568
                                                                                                        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                          4⤵
                                                                                                            PID:5492
                                                                                                      • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                        "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                        2⤵
                                                                                                        • Executes dropped EXE
                                                                                                        • Suspicious use of SetThreadContext
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:4224
                                                                                                        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                          3⤵
                                                                                                          • Suspicious use of SetThreadContext
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:6040
                                                                                                          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                            4⤵
                                                                                                              PID:6068
                                                                                                        • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                          "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                          2⤵
                                                                                                          • Executes dropped EXE
                                                                                                          • Suspicious use of SetThreadContext
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:4080
                                                                                                          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                            3⤵
                                                                                                            • Suspicious use of SetThreadContext
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:1996
                                                                                                            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                              "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                              4⤵
                                                                                                                PID:5340
                                                                                                          • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                            "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                            2⤵
                                                                                                            • Executes dropped EXE
                                                                                                            • Suspicious use of SetThreadContext
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:5996
                                                                                                            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                              "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                              3⤵
                                                                                                              • Suspicious use of SetThreadContext
                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                              PID:5488
                                                                                                              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                4⤵
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                PID:5520
                                                                                                          • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                            "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                            2⤵
                                                                                                            • Executes dropped EXE
                                                                                                            • Suspicious use of SetThreadContext
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:3056
                                                                                                            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                              "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                              3⤵
                                                                                                              • Suspicious use of SetThreadContext
                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                              PID:5960
                                                                                                              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                4⤵
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                PID:3812
                                                                                                          • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                            "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                            2⤵
                                                                                                            • Executes dropped EXE
                                                                                                            • Suspicious use of SetThreadContext
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:6032
                                                                                                            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                              "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                              3⤵
                                                                                                              • Suspicious use of SetThreadContext
                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                              PID:3496
                                                                                                              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                4⤵
                                                                                                                  PID:4772
                                                                                                            • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                              "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                              2⤵
                                                                                                              • Executes dropped EXE
                                                                                                              • Suspicious use of SetThreadContext
                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                              PID:3940
                                                                                                              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                3⤵
                                                                                                                • Suspicious use of SetThreadContext
                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                PID:5356
                                                                                                                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                  "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                  4⤵
                                                                                                                    PID:5456
                                                                                                              • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                                "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                                2⤵
                                                                                                                • Executes dropped EXE
                                                                                                                • Suspicious use of SetThreadContext
                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                PID:5464
                                                                                                                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                  "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                  3⤵
                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                  PID:3076
                                                                                                                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                    "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                    4⤵
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    PID:6068
                                                                                                              • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                                "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                                2⤵
                                                                                                                • Executes dropped EXE
                                                                                                                • Suspicious use of SetThreadContext
                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                PID:6068
                                                                                                                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                  "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                  3⤵
                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                  PID:5588
                                                                                                                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                    "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                    4⤵
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    PID:4720
                                                                                                              • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                                "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                                2⤵
                                                                                                                • Executes dropped EXE
                                                                                                                • Suspicious use of SetThreadContext
                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                PID:3020
                                                                                                                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                  "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                  3⤵
                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                  PID:5688
                                                                                                                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                    "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                    4⤵
                                                                                                                      PID:5836
                                                                                                                • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                                  "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                                  2⤵
                                                                                                                  • Executes dropped EXE
                                                                                                                  • Suspicious use of SetThreadContext
                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                  PID:5512
                                                                                                                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                    "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                    3⤵
                                                                                                                    • Suspicious use of SetThreadContext
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    PID:4284
                                                                                                                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                      4⤵
                                                                                                                        PID:6068
                                                                                                                  • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                                    "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                                    2⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Suspicious use of SetThreadContext
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    PID:2820
                                                                                                                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                      3⤵
                                                                                                                      • Suspicious use of SetThreadContext
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                      PID:5572
                                                                                                                      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                        4⤵
                                                                                                                          PID:5696
                                                                                                                    • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                                      "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                                      2⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • Suspicious use of SetThreadContext
                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                      PID:5280
                                                                                                                      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                        3⤵
                                                                                                                        • Suspicious use of SetThreadContext
                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                        PID:1456
                                                                                                                        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                          4⤵
                                                                                                                            PID:1692
                                                                                                                      • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                                        "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                                        2⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Suspicious use of SetThreadContext
                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                        PID:5656
                                                                                                                        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                          3⤵
                                                                                                                          • Suspicious use of SetThreadContext
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                          PID:2212
                                                                                                                          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                            4⤵
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            PID:5844
                                                                                                                      • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                                        "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                                        2⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Suspicious use of SetThreadContext
                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                        PID:5716
                                                                                                                        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                          3⤵
                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                          PID:5556
                                                                                                                          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                            4⤵
                                                                                                                              PID:6184
                                                                                                                        • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                                          "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                                          2⤵
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Suspicious use of SetThreadContext
                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                          PID:5528
                                                                                                                          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                            3⤵
                                                                                                                            • Suspicious use of SetThreadContext
                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                            PID:6084
                                                                                                                            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                              "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                              4⤵
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              PID:5528
                                                                                                                        • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                                          "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                                          2⤵
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Suspicious use of SetThreadContext
                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                          PID:3556
                                                                                                                          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                            3⤵
                                                                                                                            • Suspicious use of SetThreadContext
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                            PID:5108
                                                                                                                            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                              "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                              4⤵
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              PID:6108
                                                                                                                        • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                                          "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                                          2⤵
                                                                                                                          • Executes dropped EXE
                                                                                                                          • Suspicious use of SetThreadContext
                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                          PID:2304
                                                                                                                          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                            3⤵
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            PID:5640
                                                                                                                            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                              "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                              4⤵
                                                                                                                                PID:6172
                                                                                                                          • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                                            "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                                            2⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Suspicious use of SetThreadContext
                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                            PID:5840
                                                                                                                            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                              "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                              3⤵
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              PID:6132
                                                                                                                              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                4⤵
                                                                                                                                  PID:6648
                                                                                                                            • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                                              "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                                              2⤵
                                                                                                                              • Executes dropped EXE
                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                              PID:5020
                                                                                                                              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                3⤵
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                PID:6224
                                                                                                                                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                  "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                  4⤵
                                                                                                                                    PID:6796
                                                                                                                              • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                                                "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                                                2⤵
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Suspicious use of SetThreadContext
                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                PID:1704
                                                                                                                                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                  "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                  3⤵
                                                                                                                                    PID:5648
                                                                                                                                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                      4⤵
                                                                                                                                        PID:6944
                                                                                                                                  • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                                                    "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                                                    2⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Suspicious use of SetThreadContext
                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                    PID:4508
                                                                                                                                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                      3⤵
                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                      PID:3384
                                                                                                                                      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                        4⤵
                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                        PID:6364
                                                                                                                                  • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                                                    "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                                                    2⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Suspicious use of SetThreadContext
                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                    PID:4016
                                                                                                                                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                      3⤵
                                                                                                                                        PID:3480
                                                                                                                                        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                          4⤵
                                                                                                                                            PID:6164
                                                                                                                                      • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                                                        "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                                                        2⤵
                                                                                                                                        • Executes dropped EXE
                                                                                                                                        • Suspicious use of SetThreadContext
                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                        PID:5140
                                                                                                                                        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                          3⤵
                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                          PID:5988
                                                                                                                                          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                            4⤵
                                                                                                                                              PID:6448
                                                                                                                                        • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                                                          "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                                                          2⤵
                                                                                                                                          • Executes dropped EXE
                                                                                                                                          • Suspicious use of SetThreadContext
                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                          PID:6016
                                                                                                                                          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                            3⤵
                                                                                                                                              PID:4116
                                                                                                                                              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                4⤵
                                                                                                                                                  PID:6436
                                                                                                                                            • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                                                              "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                                                              2⤵
                                                                                                                                              • Executes dropped EXE
                                                                                                                                              • Suspicious use of SetThreadContext
                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                              PID:6012
                                                                                                                                              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                3⤵
                                                                                                                                                  PID:6124
                                                                                                                                                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                    "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                    4⤵
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    PID:5492
                                                                                                                                              • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                                                                "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                                                                2⤵
                                                                                                                                                • Executes dropped EXE
                                                                                                                                                • Suspicious use of SetThreadContext
                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                PID:5720
                                                                                                                                                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                  "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                  3⤵
                                                                                                                                                    PID:5424
                                                                                                                                                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                      4⤵
                                                                                                                                                        PID:6280
                                                                                                                                                  • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                                                                    "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                                                                    2⤵
                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                    • Suspicious use of SetThreadContext
                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                    PID:5624
                                                                                                                                                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                      3⤵
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      PID:5460
                                                                                                                                                      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                        4⤵
                                                                                                                                                          PID:6352
                                                                                                                                                    • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                                                                      "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                                                                      2⤵
                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                      PID:5252
                                                                                                                                                      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                        3⤵
                                                                                                                                                          PID:6332
                                                                                                                                                          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                            4⤵
                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                            PID:7148
                                                                                                                                                      • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                                                                        "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                                                                        2⤵
                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                        • Suspicious use of SetThreadContext
                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                        PID:6072
                                                                                                                                                        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                          3⤵
                                                                                                                                                            PID:4028
                                                                                                                                                            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                              "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                              4⤵
                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                              PID:6788
                                                                                                                                                        • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                                                                          "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                                                                          2⤵
                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                          PID:6140
                                                                                                                                                          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                            3⤵
                                                                                                                                                              PID:6340
                                                                                                                                                              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                                4⤵
                                                                                                                                                                  PID:7156
                                                                                                                                                            • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                                                                              "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                                                                              2⤵
                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                              • Suspicious use of SetThreadContext
                                                                                                                                                              PID:1636
                                                                                                                                                              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                                3⤵
                                                                                                                                                                  PID:5716
                                                                                                                                                                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                                    "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                                    4⤵
                                                                                                                                                                      PID:5980
                                                                                                                                                                • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                                                                                  "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                                                                                  2⤵
                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                  PID:2084
                                                                                                                                                                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                                    "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                                    3⤵
                                                                                                                                                                      PID:6676
                                                                                                                                                                      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                                        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                                        4⤵
                                                                                                                                                                          PID:6416
                                                                                                                                                                    • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                                                                                      "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                                                                                      2⤵
                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                      PID:2300
                                                                                                                                                                      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                                        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                                        3⤵
                                                                                                                                                                          PID:6660
                                                                                                                                                                          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                                            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                                            4⤵
                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                            PID:6848
                                                                                                                                                                      • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                                                                                        "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                                                                                        2⤵
                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                        • Suspicious use of SetThreadContext
                                                                                                                                                                        PID:4296
                                                                                                                                                                        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                                          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                                          3⤵
                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                          PID:6156
                                                                                                                                                                          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                                            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                                            4⤵
                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                            PID:6972
                                                                                                                                                                            • C:\Windows\System32\Conhost.exe
                                                                                                                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                              5⤵
                                                                                                                                                                                PID:3020
                                                                                                                                                                        • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                                                                                          "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                                                                                          2⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          PID:6060
                                                                                                                                                                          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                                            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                                            3⤵
                                                                                                                                                                              PID:5860
                                                                                                                                                                              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                                                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                                                4⤵
                                                                                                                                                                                  PID:6256
                                                                                                                                                                            • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                                                                                              "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                                                                                              2⤵
                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                              PID:1172
                                                                                                                                                                              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                                                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                                                3⤵
                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                PID:6960
                                                                                                                                                                                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                                                  "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                                                  4⤵
                                                                                                                                                                                    PID:7296
                                                                                                                                                                              • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                                                                                                "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                                                                                                2⤵
                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                PID:6028
                                                                                                                                                                                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                                                  "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                                                  3⤵
                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                  PID:7132
                                                                                                                                                                                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                                                    "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                                                    4⤵
                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                    PID:6048
                                                                                                                                                                              • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                                                                                                "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                                                                                                2⤵
                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                PID:5632
                                                                                                                                                                                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                                                  "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                                                  3⤵
                                                                                                                                                                                    PID:6988
                                                                                                                                                                                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                                                      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                                                      4⤵
                                                                                                                                                                                        PID:7088
                                                                                                                                                                                  • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                                                                                                    "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                                                                                                    2⤵
                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                    PID:5828
                                                                                                                                                                                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                                                      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                                                      3⤵
                                                                                                                                                                                        PID:7092
                                                                                                                                                                                        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                                                          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                                                          4⤵
                                                                                                                                                                                            PID:2300
                                                                                                                                                                                      • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                                                                                                        "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                                                                                                        2⤵
                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                        PID:1528
                                                                                                                                                                                        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                                                          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                                                          3⤵
                                                                                                                                                                                            PID:7124
                                                                                                                                                                                            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                                                              "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                                                              4⤵
                                                                                                                                                                                                PID:2224
                                                                                                                                                                                          • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                                                                                                            "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                                                                                                            2⤵
                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                            PID:5092
                                                                                                                                                                                            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                                                              "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                                                              3⤵
                                                                                                                                                                                                PID:7104
                                                                                                                                                                                                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                                                                  "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                    PID:7372
                                                                                                                                                                                              • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                                                                                                                "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                PID:5104
                                                                                                                                                                                                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                                                                  "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                    PID:7080
                                                                                                                                                                                                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                                                                      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                      PID:7996
                                                                                                                                                                                                • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                                                                                                                  "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                  PID:5608
                                                                                                                                                                                                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                                                                    "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                                    PID:1804
                                                                                                                                                                                                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                                                                      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                        PID:7972
                                                                                                                                                                                                  • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                                                                                                                    "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                    PID:6088
                                                                                                                                                                                                    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                                                                      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                        PID:6528
                                                                                                                                                                                                        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                                                                          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                          PID:7964
                                                                                                                                                                                                    • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                                                                                                                      "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                      PID:4472
                                                                                                                                                                                                      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                                                                        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                        PID:7392
                                                                                                                                                                                                        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                                                                          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                          PID:6060
                                                                                                                                                                                                    • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                                                                                                                      "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                                                      PID:5732
                                                                                                                                                                                                      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                                                                        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                          PID:7644
                                                                                                                                                                                                          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                                                                            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                            PID:6248
                                                                                                                                                                                                      • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                                                                                                                        "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                        PID:5552
                                                                                                                                                                                                        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                                                                          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                            PID:7492
                                                                                                                                                                                                            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                                                                              "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                              PID:6692
                                                                                                                                                                                                        • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                                                                                                                          "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                          PID:5140
                                                                                                                                                                                                          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                                                                            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                              PID:7920
                                                                                                                                                                                                              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                                                                                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                  PID:5484
                                                                                                                                                                                                            • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                                                                                                                              "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                              PID:2156
                                                                                                                                                                                                              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                                                                                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                PID:7888
                                                                                                                                                                                                                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                                                                                  "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                  PID:6136
                                                                                                                                                                                                            • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                                                                                                                              "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                              PID:2040
                                                                                                                                                                                                              • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                                                                                "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                  PID:7896
                                                                                                                                                                                                                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                                                                                    "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                    PID:7216
                                                                                                                                                                                                              • C:\Users\Admin\Downloads\Rc7.exe
                                                                                                                                                                                                                "C:\Users\Admin\Downloads\Rc7.exe"
                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                PID:5724
                                                                                                                                                                                                                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                                                                                  "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                  PID:7472
                                                                                                                                                                                                                  • C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe
                                                                                                                                                                                                                    "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"
                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                      PID:8148
                                                                                                                                                                                                              • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                                                                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                  PID:4720
                                                                                                                                                                                                                • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                                                                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                    PID:1368
                                                                                                                                                                                                                  • C:\Windows\system32\osk.exe
                                                                                                                                                                                                                    "C:\Windows\system32\osk.exe"
                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                    PID:6820
                                                                                                                                                                                                                  • C:\Windows\System32\rundll32.exe
                                                                                                                                                                                                                    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                      PID:6852
                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe
                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe"
                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                      • Modifies system executable filetype association
                                                                                                                                                                                                                      • Checks processor information in registry
                                                                                                                                                                                                                      • Modifies Internet Explorer settings
                                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                                      • Suspicious behavior: AddClipboardFormatListener
                                                                                                                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                      • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                      PID:5744
                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe
                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe" /update /restart
                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                        • Checks system information in the registry
                                                                                                                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                        PID:5732
                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe
                                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe /update /restart /peruser /childprocess /extractFilesWithLessThreadCount /renameReplaceOneDriveExe /renameReplaceODSUExe /removeNonCurrentVersions /enableODSUReportingMode
                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                          • Checks computer location settings
                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                          • Modifies system executable filetype association
                                                                                                                                                                                                                          • Adds Run key to start application
                                                                                                                                                                                                                          • Checks system information in the registry
                                                                                                                                                                                                                          • Modifies Internet Explorer settings
                                                                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                          PID:6356
                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\FileSyncConfig.exe
                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\FileSyncConfig.exe"
                                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                                            • Loads dropped DLL
                                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                                                                            PID:5936
                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe
                                                                                                                                                                                                                            /updateInstalled /background
                                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                                            • Loads dropped DLL
                                                                                                                                                                                                                            • Modifies system executable filetype association
                                                                                                                                                                                                                            • Checks system information in the registry
                                                                                                                                                                                                                            • Modifies Internet Explorer settings
                                                                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                                                                            • Suspicious behavior: AddClipboardFormatListener
                                                                                                                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                            • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                            • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                            PID:5868

                                                                                                                                                                                                                    Network

                                                                                                                                                                                                                    MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                    Replay Monitor

                                                                                                                                                                                                                    Loading Replay Monitor...

                                                                                                                                                                                                                    Downloads

                                                                                                                                                                                                                    • C:\ProgramData\svchost\vcredist2010_x64.log-MSI_vc_red.msi.ico

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      fde1b01ca49aa70922404cdfcf32a643

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      b0a2002c39a37a0ccaf219d42f1075471fd8b481

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      741fe085e34db44b7c8ae83288697fab1359b028411c45dab2a3ca8b9ea548a5

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      b6b4af427069602e929c1a6ce9d88c4634f0927b7292efb4070d15fb40ce39fc5ce868452dcd5642b2864730502de7a4c33679c936beb1a86c26a753d3f4dc25

                                                                                                                                                                                                                    • C:\ProgramData\svchost\vcredist2010_x64.log.ico

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      bb4ff6746434c51de221387a31a00910

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      43e764b72dc8de4f65d8cf15164fc7868aa76998

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      546c4eeccca3320558d30eac5dc3d4726846bdc54af33aa63ac8f3e6fc128506

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      1e4c405eca8d1b02147271095545434697d3d672310b4ea2ecca8715eaa9689be3f25c3d4898e7a4b42c413f258eda729a70f5ad8bc314a742082b5a6a8e9ff1

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\RegSvcs.exe.log

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      120B

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      50dec1858e13f033e6dca3cbfad5e8de

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      79ae1e9131b0faf215b499d2f7b4c595aa120925

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      14a557e226e3ba8620bb3a70035e1e316f1e9fb5c9e8f74c07110ee90b8d8ae4

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      1bd73338df685a5b57b0546e102ecfdee65800410d6f77845e50456ac70de72929088af19b59647f01cba7a5acfb399c52d9ef2402a9451366586862ef88e7bf

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      152B

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      99afa4934d1e3c56bbce114b356e8a99

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      3f0e7a1a28d9d9c06b6663df5d83a65c84d52581

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      08e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      76686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      152B

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      443a627d539ca4eab732bad0cbe7332b

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      86b18b906a1acd2a22f4b2c78ac3564c394a9569

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      1e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      144B

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      7b69d72408d2cf48c88133c08f1ec428

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      fa04b68c86e404b9d3e276b015176772a057c26d

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      e5809649c96320e6cd1798e6cee486e6594a880f439ed9ba8baf7777b6d93873

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      2bb7a85804d120d26b4232ea70af200806d5ec9a04a35ee64a731e816e67408be37126bd3489bf8d9e15990a601e744be33f21441cc5d1c0f7ea2330b49bd092

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      391B

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      5443244819526c00cac01d095e2bf58f

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      c8cbae51c0d5ccaf8cefd43834893204bf6081dd

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      51b41792d3e73abdcb83e89e005cf3e188c9caac9cfdc2dcf7c5367c6fd65ceb

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      395c5a9a2c2b636ecebcf436128215d582c6a30e89a58fb7ae27b8eddd7b5be1f8b72e43880233cfd2fcf761aa5a1b50f6fde026462bc72db2bacee37caf50cf

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      5KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      d875808db88fa47d4d3e0818d3303840

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      b250394d4233d08d8ef7802cd0bb92c3a82825cf

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      1053c4d71dcb1c367f11ef7134c51182a9c971abc21640c8a53c1d8f9cf71f28

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      84e9545df91456ae9e6b375b85b98830b68d486d0975fa398a6dd3b7b2075861a5b9a060926f5c6e11307fd7edf4fc2e0095d9c110f90764fba312e38813c42c

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      6KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      d9dcca348dd36d80a7b9656f2c55b97b

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      190c08247953531b20a3474aa443e8ad736b3eba

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      c98628d8216d24f08d5a7447776d1b5c30b15dbf1b69b84a4b20dc6e872c5543

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      b03ff2732c9903f51b49f10ee3dc4919c5174b958f458abd797e91aec56f90b6b43caa88e3fa895a2b0d5be9a6dd780813932052c19ceb5a21b53f901909b682

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      6KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      1f5683946719d1c61cccb39032ad56b2

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      6bd02bd975d069ab241eb88ad979f978293a86d0

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      ec22f6e6a3ba12ca46050224db6cdb5809f3c835531d719bd36a44e606567fdc

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      39926b555645246745657b7f8edf90a02e6d9235f32e42760ace76caf45e85194f79c99993001ee30f12fc5a2f547d28fee380bf73885ba6c361b207627616c5

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      6KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      247cb6222fed80a27f905269aa310567

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      426ef2c9877da614c1efa82348ba7ab6cacd41fc

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      4b8f4be604d00c1a62369cf77998e8a74058e0b4bf54d3797591a3771ce30674

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      8f363700c534e6e35ac63f7f6ad2a61f41f9229838ed44eb8c64307a95e6c3391b7c26039b9e47a5d8529977a97cda2ff8d6432987c6bc990fe9dd68a9b14d0b

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      16B

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      46295cac801e5d4857d09837238a6394

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      16B

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      206702161f94c5cd39fadd03f4014d98

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      11KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      e187cacb2a3be24af43278df32a810b6

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      d4b5fe0bf4a9ed79e8a058f57a97c55e32feff51

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      bfe9f7e115fb394a4d90729efc874c464e635f7e31f2fea202784127c391c141

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      8b3e1898e7bcdf7e64a4968ce42fa7ae72ad354e5e333d4bc01e3c2b55db66918a5d483e0eeba774f6a6a7163dbb657be84e266b15f6e41587748d396793879d

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      10KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      82247a4d5c3106eea45e8820f96232b1

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      8c9518af5d0c24fe042adc04a4116022f4696715

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      a6a138b46d0c51b9e1b478ed3ff83b935f013b12ecc6c31f4b54ce7973ba6153

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      9fd712007b5ab92a8078bfd1d7f15e60956d2685c21815b33a6802e1bb5dc48f2b541df7bb1884eb53e2f311e7f8ff37755a89db2fb464c9757538cc1aa2bb43

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      10KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      7f69a76b50cd3cf88d62b74f7e546556

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      2e0f4be3dcbe60a406aea2c79c604220a70e5bc3

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      7cf1db795458a51b9c472b3d4943a448ac68d55d34731db9fe572d9c6c5869fe

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      2ec9f0086d46d1c160e971ab8681513ec2b25fff4ae86e73db676bbb1a0bce2d5bc2a2f78e9d5bd3cd7a5ae784c7763f1acfea3754ecf3d800b30ae6d876a170

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      10KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      85c91eaa3cdcd8cae1b42a8803c82b24

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      67a2930cebc6d239d2ec3acbc3c763a9283ea9a8

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      735643f375b8ddfb3268def57b2255b88f11c53d2bfd6e276ad06d3c4a06497b

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      639ea6157b36cb79a9f35322ab2a1a4240a00ea0cb89331b1bee6b12b4bd3749ee4d6f94947718f7af22f4ea37dd5d24d40d243d6cd17a151572a666d6ae3175

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\FileSyncConfig.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      553KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      57bd9bd545af2b0f2ce14a33ca57ece9

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      15b4b5afff9abba2de64cbd4f0989f1b2fbc4bf1

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      a3a4b648e4dcf3a4e5f7d13cc3d21b0353e496da75f83246cc8a15fada463bdf

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      d134f9881312ddbd0d61f39fd62af5443a4947d3de010fef3b0f6ebf17829bd4c2f13f6299d2a7aad35c868bb451ef6991c5093c2809e6be791f05f137324b39

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-black_scale-100.png

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      1KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      72747c27b2f2a08700ece584c576af89

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      5301ca4813cd5ff2f8457635bc3c8944c1fb9f33

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      6f028542f6faeaaf1f564eab2605bedb20a2ee72cdd9930bde1a3539344d721b

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      3e7f84d3483a25a52a036bf7fd87aac74ac5af327bb8e4695e39dada60c4d6607d1c04e7769a808be260db2af6e91b789008d276ccc6b7e13c80eb97e2818aba

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-black_scale-125.png

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      1KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      b83ac69831fd735d5f3811cc214c7c43

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      5b549067fdd64dcb425b88fabe1b1ca46a9a8124

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      cbdcf248f8a0fcd583b475562a7cdcb58f8d01236c7d06e4cdbfe28e08b2a185

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      4b2ee6b3987c048ab7cc827879b38fb3c216dab8e794239d189d1ba71122a74fdaa90336e2ea33abd06ba04f37ded967eb98fd742a02463b6eb68ab917155600

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-black_scale-150.png

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      771bc7583fe704745a763cd3f46d75d2

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      e38f9d7466eefc6d3d2aaa327f1bd42c5a5c7752

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      36a6aad9a9947ab3f6ac6af900192f5a55870d798bca70c46770ccf2108fd62d

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      959ea603abec708895b7f4ef0639c3f2d270cfdd38d77ac9bab8289918cbd4dbac3c36c11bb52c6f01b0adae597b647bb784bba513d77875979270f4962b7884

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-black_scale-200.png

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      09773d7bb374aeec469367708fcfe442

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      2bfb6905321c0c1fd35e1b1161d2a7663e5203d6

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      67d1bb54fcb19c174de1936d08b5dbdb31b98cfdd280bcc5122fb0693675e4f2

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      f500ea4a87a24437b60b0dc3ec69fcc5edbc39c2967743ddb41093b824d0845ffddd2df420a12e17e4594df39f63adad5abb69a29f8456fed03045a6b42388bc

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-black_scale-400.png

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      6KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      e01cdbbd97eebc41c63a280f65db28e9

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      1c2657880dd1ea10caf86bd08312cd832a967be1

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      5cb8fd670585de8a7fc0ceede164847522d287ef17cd48806831ea18a0ceac1f

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      ffd928e289dc0e36fa406f0416fb07c2eb0f3725a9cdbb27225439d75b8582d68705ec508e3c4af1fc4982d06d70ef868cafbfc73a637724dee7f34828d14850

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-white_scale-100.png

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      19876b66df75a2c358c37be528f76991

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      181cab3db89f416f343bae9699bf868920240c8b

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      a024fc5dbe0973fd9267229da4ebfd8fc41d73ca27a2055715aafe0efb4f3425

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      78610a040bbbb026a165a5a50dfbaf4208ebef7407660eea1a20e95c30d0d42ef1d13f647802a2f0638443ae2253c49945ebe018c3499ddbf00cfdb1db42ced1

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-white_scale-125.png

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      3KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      8347d6f79f819fcf91e0c9d3791d6861

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      5591cf408f0adaa3b86a5a30b0112863ec3d6d28

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      e8b30bfcee8041f1a70e61ca46764416fd1df2e6086ba4c280bfa2220c226750

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      9f658bc77131f4ac4f730ed56a44a406e09a3ceec215b7a0b2ed42d019d8b13d89ab117affb547a5107b5a84feb330329dc15e14644f2b52122acb063f2ba550

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-white_scale-150.png

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      3KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      de5ba8348a73164c66750f70f4b59663

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      1d7a04b74bd36ecac2f5dae6921465fc27812fec

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      a0bbe33b798c3adac36396e877908874cffaadb240244095c68dff840dcbbf73

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      85197e0b13a1ae48f51660525557cceaeed7d893dd081939f62e6e8921bb036c6501d3bb41250649048a286ff6bac6c9c1a426d2f58f3e3b41521db26ef6a17c

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-white_scale-200.png

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      f1c75409c9a1b823e846cc746903e12c

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      f0e1f0cf35369544d88d8a2785570f55f6024779

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      fba9104432cbb8ebbd45c18ef1ba46a45dd374773e5aa37d411bb023ded8efd6

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      ed72eb547e0c03776f32e07191ce7022d08d4bcc66e7abca4772cdd8c22d8e7a423577805a4925c5e804ed6c15395f3df8aac7af62f1129e4982685d7e46bd85

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-white_scale-400.png

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      8KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      adbbeb01272c8d8b14977481108400d6

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      1cc6868eec36764b249de193f0ce44787ba9dd45

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      9250ef25efc2a9765cf1126524256fdfc963c8687edfdc4a2ecde50d748ada85

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      c15951cf2dc076ed508665cd7dac2251c8966c1550b78549b926e98c01899ad825535001bd65eeb2f8680cd6753cd47e95606ecf453919f5827ed12bca062887

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.scale-100.png

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      57a6876000151c4303f99e9a05ab4265

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      1a63d3dd2b8bdc0061660d4add5a5b9af0ff0794

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      8acbdd41252595b7410ca2ed438d6d8ede10bd17fe3a18705eedc65f46e4c1c4

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      c6a2a9124bc6bcf70d2977aaca7e3060380a4d9428a624cc6e5624c75ebb6d6993c6186651d4e54edf32f3491d413714ef97a4cdc42bae94045cd804f0ad7cba

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.scale-125.png

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      d03b7edafe4cb7889418f28af439c9c1

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      16822a2ab6a15dda520f28472f6eeddb27f81178

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      a5294e3c7cd855815f8d916849d87bd2357f5165eb4372f248fdf8b988601665

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      59d99f0b9a7813b28bae3ea1ae5bdbbf0d87d32ff621ff20cbe1b900c52bb480c722dd428578dea5d5351cc36f1fa56b2c1712f2724344f026fe534232812962

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.scale-150.png

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      5KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      a23c55ae34e1b8d81aa34514ea792540

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      3b539dfb299d00b93525144fd2afd7dd9ba4ccbf

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      3df4590386671e0d6fee7108e457eb805370a189f5fdfeaf2f2c32d5adc76abd

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      1423a2534ae71174f34ee527fe3a0db38480a869cac50b08b60a2140b5587b3944967a95016f0b00e3ca9ced1f1452c613bb76c34d7ebd386290667084bce77d

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.scale-200.png

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      6KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      13e6baac125114e87f50c21017b9e010

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      561c84f767537d71c901a23a061213cf03b27a58

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      3384357b6110f418b175e2f0910cffe588c847c8e55f2fe3572d82999a62c18e

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      673c3bec7c2cd99c07ebfca0f4ab14cd6341086c8702fe9e8b5028aed0174398d7c8a94583da40c32cd0934d784062ad6db71f49391f64122459f8bb00222e08

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.scale-400.png

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      15KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      e593676ee86a6183082112df974a4706

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      c4e91440312dea1f89777c2856cb11e45d95fe55

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      deb0ec0ee8f1c4f7ea4de2c28ff85087ee5ff8c7e3036c3b0a66d84bae32b6bb

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      11d7ed45f461f44fa566449bb50bcfce35f73fc775744c2d45ea80aeb364fe40a68a731a2152f10edc059dea16b8bab9c9a47da0c9ffe3d954f57da0ff714681

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.contrast-black_scale-100.png

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      783B

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      f4e9f958ed6436aef6d16ee6868fa657

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      b14bc7aaca388f29570825010ebc17ca577b292f

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      292cac291af7b45f12404f968759afc7145b2189e778b14d681449132b14f06b

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      cd5d78317e82127e9a62366fd33d5420a6f25d0a6e55552335e64dc39932238abd707fe75d4f62472bc28a388d32b70ff08b6aa366c092a7ace3367896a2bd98

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.contrast-black_scale-125.png

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      1018B

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      2c7a9e323a69409f4b13b1c3244074c4

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      3c77c1b013691fa3bdff5677c3a31b355d3e2205

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      8efeacefb92d64dfb1c4df2568165df6436777f176accfd24f4f7970605d16c2

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      087c12e225c1d791d7ad0bf7d3544b4bed8c4fb0daaa02aee0e379badae8954fe6120d61fdf1a11007cbcdb238b5a02c54f429b6cc692a145aa8fbd220c0cb2d

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.contrast-black_scale-150.png

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      1KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      552b0304f2e25a1283709ad56c4b1a85

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      92a9d0d795852ec45beae1d08f8327d02de8994e

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      262b9a30bb8db4fc59b5bc348aa3813c75e113066a087135d0946ad916f72535

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      9559895b66ef533486f43274f7346ad3059c15f735c9ce5351adf1403c95c2b787372153d4827b03b6eb530f75efcf9ae89db1e9c69189e86d6383138ab9c839

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.contrast-black_scale-200.png

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      1KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      22e17842b11cd1cb17b24aa743a74e67

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      f230cb9e5a6cb027e6561fabf11a909aa3ba0207

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      9833b80def72b73fca150af17d4b98c8cd484401f0e2d44320ecd75b5bb57c42

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      8332fc72cd411f9d9fd65950d58bf6440563dc4bd5ce3622775306575802e20c967f0ee6bab2092769a11e2a4ea228dab91a02534beeb8afde8239dd2b90f23a

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.contrast-black_scale-400.png

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      3KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      3c29933ab3beda6803c4b704fba48c53

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      056fe7770a2ba171a54bd60b3c29c4fbb6d42f0c

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      3a7ef7c0bda402fdaff19a479d6c18577c436a5f4e188da4c058a42ef09a7633

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      09408a000a6fa8046649c61ccef36afa1046869506f019f739f67f5c1c05d2e313b95a60bd43d9be882688df1610ad7979dd9d1f16a2170959b526ebd89b8ef7

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.scale-100.png

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      1KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      1f156044d43913efd88cad6aa6474d73

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      1f6bd3e15a4bdb052746cf9840bdc13e7e8eda26

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      4e11167708801727891e8dd9257152b7391fc483d46688d61f44b96360f76816

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      df791d7c1e7a580e589613b5a56ba529005162d3564fffd4c8514e6afaa5eccea9cea9e1ac43bd9d74ee3971b2e94d985b103176db592e3c775d5feec7aac6d1

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.scale-125.png

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      09f3f8485e79f57f0a34abd5a67898ca

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      e68ae5685d5442c1b7acc567dc0b1939cad5f41a

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      69e432d1eec44bed4aad35f72a912e1f0036a4b501a50aec401c9fa260a523e3

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      0eafeaf735cedc322719049db6325ccbf5e92de229cace927b78a08317e842261b7adbda03ec192f71ee36e35eb9bf9624589de01beaec2c5597a605fc224130

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.scale-150.png

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      3KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      ed306d8b1c42995188866a80d6b761de

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      eadc119bec9fad65019909e8229584cd6b7e0a2b

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      7e3f35d5eb05435be8d104a2eacf5bace8301853104a4ea4768601c607ddf301

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      972a42f7677d57fcb8c8cb0720b21a6ffe9303ea58dde276cfe2f26ee68fe4cc8ae6d29f3a21a400253de7c0a212edf29981e9e2bca49750b79dd439461c8335

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.scale-200.png

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      d9d00ecb4bb933cdbb0cd1b5d511dcf5

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      4e41b1eda56c4ebe5534eb49e826289ebff99dd9

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      85823f7a5a4ebf8274f790a88b981e92ede57bde0ba804f00b03416ee4feda89

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      8b53dec59bba8b4033e5c6b2ff77f9ba6b929c412000184928978f13b475cd691a854fee7d55026e48eab8ac84cf34fc7cb38e3766bbf743cf07c4d59afb98f4

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.scale-400.png

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      11KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      096d0e769212718b8de5237b3427aacc

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      4b912a0f2192f44824057832d9bb08c1a2c76e72

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      9a0b901e97abe02036c782eb6a2471e18160b89fd5141a5a9909f0baab67b1ef

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      99eb3d67e1a05ffa440e70b7e053b7d32e84326671b0b9d2fcfcea2633b8566155477b2a226521bf860b471c5926f8e1f8e3a52676cacb41b40e2b97cb3c1173

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\OneDrive.VisualElementsManifest.xml

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      344B

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      5ae2d05d894d1a55d9a1e4f593c68969

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      a983584f58d68552e639601538af960a34fa1da7

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      d21077ad0c29a4c939b8c25f1186e2b542d054bb787b1d3210e9cab48ec3080c

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      152949f5b661980f33608a0804dd8c43d70e056ae0336e409006e764664496fef6e60daa09fecb8d74523d3e7928c0dbd5d8272d8be1cf276852d88370954adc

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\OneDrive.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2.3MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      c2938eb5ff932c2540a1514cc82c197c

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      2d7da1c3bfa4755ba0efec5317260d239cbb51c3

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      5d8273bf98397e4c5053f8f154e5f838c7e8a798b125fcad33cab16e2515b665

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      5deb54462615e39cf7871418871856094031a383e9ad82d5a5993f1e67b7ade7c2217055b657c0d127189792c3bcf6c1fcfbd3c5606f6134adfafcccfa176441

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\OneDriveStandaloneUpdater.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      2.9MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      9cdabfbf75fd35e615c9f85fedafce8a

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      57b7fc9bf59cf09a9c19ad0ce0a159746554d682

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      969fbb03015dd9f33baf45f2750e36b77003a7e18c3954fab890cddc94046673

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      348923f497e615a5cd0ed428eb1e30a792dea310585645b721235d48f3f890398ad51d8955c1e483df0a712ba2c0a18ad99b977be64f5ee6768f955b12a4a236

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\Resources.pri

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      7473be9c7899f2a2da99d09c596b2d6d

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      0f76063651fe45bbc0b5c0532ad87d7dc7dc53ac

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      e1252527bc066da6838344d49660e4c6ff2d1ddfda036c5ec19b07fdfb90c8c3

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      a4a5c97856e314eedbad38411f250d139a668c2256d917788697c8a009d5408d559772e0836713853704e6a3755601ae7ee433e07a34bd0e7f130a3e28729c45

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      40.2MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      fb4aa59c92c9b3263eb07e07b91568b5

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      6071a3e3c4338b90d892a8416b6a92fbfe25bb67

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      e70e80dbbc9baba7ddcee70eda1bb8d0e6612dfb1d93827fe7b594a59f3b48b9

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      60aabbe2fd24c04c33e7892eab64f24f8c335a0dd9822eb01adc5459e850769fc200078c5ccee96c1f2013173bc41f5a2023def3f5fe36e380963db034924ace

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\settings\Personal\logUploaderSettings_temp.ini

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      38B

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      cc04d6015cd4395c9b980b280254156e

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      87b176f1330dc08d4ffabe3f7e77da4121c8e749

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      884d272d16605590e511ae50c88842a8ce203a864f56061a3c554f8f8265866e

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      d3cb7853b69649c673814d5738247b5fbaaae5bb7b84e4c7b3ff5c4f1b1a85fc7261a35f0282d79076a9c862e5e1021d31a318d8b2e5a74b80500cb222642940

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\settings\Personal\logUploaderSettings_temp.ini

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      108B

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      cdf05babefd09d4ac0dd45f8a8570af3

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      b80bdf8dc4042e52145e5e618e309ca664173298

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      1326ec4ef20c90ab462cea562ce37838ebb4a3d55dc13f2f1aa5a3c206ba6221

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      5ec164bce7991d92aab276693a57bc1c566f6d419c2a7daf7a45fb8eaea73d90495c6678d2f2a2dff511374ce54d54249401f45269ec1a108afc2457c73fa1d3

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\settings\PreSignInSettingsConfig.json

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      63KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      e516a60bc980095e8d156b1a99ab5eee

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      238e243ffc12d4e012fd020c9822703109b987f6

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      543796a1b343b4ebc0285d89cb8eb70667ac7b513da37495e38003704e9d88d7

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      9b51e99ba20e9da56d1acc24a1cf9f9c9dbdeb742bec034e0ff2bc179a60f4aff249f40344f9ddd43229dcdefa1041940f65afb336d46c175ffeff725c638d58

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\setup\logs\DeviceHealthSummaryConfiguration.ini

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      77B

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      b97f737c0087bc0a549e87a68ccf1a1f

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      2afe810ab822cfb5484f7f8adfb295e5441bb4d3

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      71ef7f0d5a7d1f9697f03888f3c3d4d4b4380d00edea7324b806adc917969270

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      00cff1c7ea7d556dc911149fd91d77209611f65af0b3baba58bc46092e9cb31c95f324fad1665d49c25e36562b7006ca747c000c6d03999f2469374b1f2f716d

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\W9QJOIKH\update100[2].xml

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      726B

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      53244e542ddf6d280a2b03e28f0646b7

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      d9925f810a95880c92974549deead18d56f19c37

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      36a6bd38a8a6f5a75b73caffae5ae66dfabcaefd83da65b493fa881ea8a64e7d

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      4aa71d92ea2c46df86565d97aac75395371d3e17877ab252a297b84dca2ab251d50aaffc62eab9961f0df48de6f12be04a1f4a2cbde75b9ae7bcce6eb5450c62

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\RES999B.tmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      5KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      db4ee71aeea01b870b82f6ff058243d7

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      2756d2434cb8ff488d44e21e4e3d353b5fe2afe0

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      d1c30ad106c56ec481ef6420012226d79ad1c7f14da102ccb1c5667f7407c087

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      287b0f1cbe1fe1762bf5a569eea4449034251fb9cedc3431cfbbf7af04a84d28a32365431a58276e2e4f8fcac2dd7ff5cbefce7aaef2b9e99a8913ca1170ad0a

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\RES9B9F.tmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      5KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      7ff5ec1279d1f59d4e9ed3c5820c8aed

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      77254f7227ef18aa186327dd5c292ba3efe57144

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      2cad3d907060da4bc99cffaa65932fe66ae320a35444cd24045a681e4e2f0765

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      ae89b317faca5e825710e3df14c1fce6a43c56dbf7c0372e528c2c6eb992a6d21e33a324121fc46f4667943e045a4ca23d8d8957f0d8c2a64b252805527fb900

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\guyqqijd.0.vb

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      369B

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      e4a08a8771d09ebc9b6f8c2579f79e49

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      e9fcba487e1a511f4a3650ab5581911b5e88395d

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      ef4c31d167a9ab650ace2442feeec1bf247e7c9813b86fbea973d2642fac1fb6

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      48135e0de7b1a95d254ae351ccac0cb39c0d9a46c294507e4bf2b582c780c1b537487161396dd69584c23455950f88512e9931dbff4287c1072938e812a34dd1

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\guyqqijd.cmdline

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      253B

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      ed3992a3347e100bac049d1bc420146d

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      ec4116cd5780582f88e9012a77e52e903ef08000

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      2bf0c61f00e66e0c5b24c9b3765eac28c660b78d32943f24181a6c1834516f39

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      4a3726f114f61e093b7c73b8b5fcb5e94eabcc8cdd0a2510b1b04049a683465d56878075899b90b1c3f5801ff98cc78a156998cc992e4112e9f46b2b47910ac6

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\minymsgu.0.vb

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      369B

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      83f6067bca9ba771f1e1b22f3ad09be3

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      f9144948829a08e507b26084b1d1b83acef1baca

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      098cd6d0243a78a14ce3b52628b309b3a6ac6176e185baf6173e8083182d2231

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      b93883c7018fdd015b2ef2e0f4f15184f2954c522fd818e4d8680c06063e018c6c2c7ae9d738b462268b0a4a0fe3e8418db49942105534361429aa431fb9db19

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\minymsgu.cmdline

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      253B

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      55a8e2133ca45e8a9c70353d12fa286e

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      50d6ff09f5a55b38dbf8a4c332731ad57cade94c

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      7547545fb986071ac45cd9dba6b5766767fa22aec2bebeff35796f380a2e4e1a

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      dd42335d2719d30f7a91d2b0fb18031968d7e762ef2981e0496065790d462f545021b216f4e09d99ca6a94b854b5fdc140dad6c569d9c514b1f2cac3c8a40ca1

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\sfbypccn.0.vb

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      355B

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      acd609faf5d65b35619397dc8a3bc721

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      ba681e91613d275de4b51317a83e19de2dbf1399

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      4cfd86d51d0133dda53ba74f67ffe1833b4c0e9aae57afe2405f181fc602f518

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      400ffd60ce7201d65e685734cea47a96abca58ca2babda8654b1d25f82d2766ca862a34f46c827249a4dc191d48f56005a9f242765d7becdda1344b8741a9d8c

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\sfbypccn.cmdline

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      224B

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      47d47713eff00747d196c6f6a7d3af8f

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      b33fb909a7f1bc5b7139b6c0ea3c7a984384521e

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      2fbdda3d69b3b4b8f4669c6b114d0714358a6f235a741122c21f464d011bd482

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      8402c21b516d3930b64f7499044c05cafbeeac0fc7eec4e4d6992515246d29fe10fdb3287f560c97d819d11d44f97c1a199d58f61a6f69da3201604fa59fe649

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\tmp8DCF.tmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      35.9MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      5b16ef80abd2b4ace517c4e98f4ff551

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      438806a0256e075239aa8bbec9ba3d3fb634af55

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      bbc70091b3834af5413b9658b07269badd4cae8d96724bf1f7919f6aab595009

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      69a22b063ab92ca7e941b826400c62be41ae0317143387c8aa8c727b5c9ee3528ddd4014de22a2a2e2cbae801cb041fe477d68d2684353cdf6c83d7ee97c43d4

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\uRClgZblR.txt

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      32B

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      e0acfe2c555c8addd7c51d8f55a5716d

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      c4eed48bb5516e577736876f61c6b3801533efd2

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      8e8f68c9769dd2172df86d3b1b45f0477c75f3020d70a4c9c9f84a7b044e1f8c

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      c2a7449e10ff80bd6a158bb87483cf1ed3e68fd8e3582b2f40f04796a314759515531dd6efd3668256b3a1cbf7731ffb105f9a4d98b77f1da79563b142111782

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\vbc6D45A12E1F2949EA8F2A222369436281.TMP

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      5KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      abeaa4a5b438ffa58d07d9459e5c1d6c

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      69631de7891162dd4840112a251f6531feae7509

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      ce174412cb2889bbf162b7ebe4476da5a9c928ba5b13111d338753ccc4c0f5fd

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      c9cae8bcc14661e993d97a3c7b658310a8b9c19044817589f92eab66f1bcfcecb3468b0de8b45cd68e218c23cd9c60aeef1d391af36ec03afab5c8b86d7937d4

                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\vbcC384483833F4DF18FF73C71B0A864B0.TMP

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      5KB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      249d49f34404bfbe7ed958880be39f61

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      51ec83fb9190df984bf73f2c5cd1edc0edf1882a

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      fcb5a4d24f24fbeaf4dc9d8e29f2701b2bb71411acb13c4fa67fe7025892912b

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      082f47f59b9184dd6c88f64214e10b82656a09c5a5cf3f0eccbf7935505db473eeb9a395cb5b59ec5009e731f2aa1891670c94ff6315a0b2d4fcc0392cff0e98

                                                                                                                                                                                                                    • C:\Users\Admin\Downloads\Unconfirmed 382346.crdownload

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      4.0MB

                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                      1d9045870dbd31e2e399a4e8ecd9302f

                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                      7857c1ebfd1b37756d106027ed03121d8e7887cf

                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                      9b4826b8876ca2f1378b1dfe47b0c0d6e972bf9f0b3a36e299b26fbc86283885

                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                      9419ed0a1c5e43f48a3534e36be9b2b03738e017c327e13586601381a8342c4c9b09aa9b89f80414d0d458284d2d17f48d27934a6b2d6d49450d045f49c10909

                                                                                                                                                                                                                    • memory/1996-106-0x000000001C0C0000-0x000000001C122000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      392KB

                                                                                                                                                                                                                    • memory/1996-104-0x000000001BA80000-0x000000001BF4E000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      4.8MB

                                                                                                                                                                                                                    • memory/1996-105-0x000000001BF50000-0x000000001BFF6000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      664KB

                                                                                                                                                                                                                    • memory/5188-108-0x0000000000400000-0x0000000000420000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      128KB

                                                                                                                                                                                                                    • memory/5216-109-0x0000000000400000-0x000000000040C000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      48KB

                                                                                                                                                                                                                    • memory/5360-163-0x0000000000410000-0x0000000000430000-memory.dmp

                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                      128KB