Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250207-en
  • resource tags

    arch:x64arch:x86image:win11-20250207-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    09-02-2025 21:47

General

  • Target

    Xeno.exe

  • Size

    140KB

  • MD5

    f0d6a8ef8299c5f15732a011d90b0be1

  • SHA1

    5d2e6cc0bd4f1e810808f2a284f6c2a30b21edcf

  • SHA256

    326bae0bd1398234dcef4c3d71f00e30cc9b447fa963e21d6f29605f42bb7e5b

  • SHA512

    5b9f1517949a7fa9fdb7413146632d21a4208dc92823b673af85963ae5cc7f827b3ba27f3e9c5554c45e726ad159aac77d30306acc3559bd8712534e41ff0f27

  • SSDEEP

    3072:2hK4Uay3XrQ8habqgp9pC9Z6p5uf3C6k0xuZ04ntfxDhBury:2hK4XycqgpfCup5sVxuZ04bhA

Malware Config

Extracted

Family

warzonerat

C2

168.61.222.215:5400

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 10 IoCs
  • UAC bypass 3 TTPs 10 IoCs
  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzonerat family
  • ReZer0 packer 1 IoCs

    Detects ReZer0, a packer with multiple versions used in various campaigns.

  • Warzone RAT payload 2 IoCs
  • Downloads MZ/PE file 4 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 18 IoCs
  • Loads dropped DLL 38 IoCs
  • Modifies system executable filetype association 2 TTPs 7 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops desktop.ini file(s) 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Checks system information in the registry 2 TTPs 6 IoCs

    System information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 3 IoCs

    When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Modifies registry class 64 IoCs
  • Modifies registry key 1 TTPs 54 IoCs
  • NTFS ADS 4 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 17 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 21 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Xeno.exe
    "C:\Users\Admin\AppData\Local\Temp\Xeno.exe"
    1⤵
      PID:3496
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:3664
      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe
        "C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe"
        1⤵
        • Modifies system executable filetype association
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Modifies Internet Explorer settings
        • Modifies registry class
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        PID:4696
        • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe
          "C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe" /update /restart
          2⤵
          • Executes dropped EXE
          • Checks system information in the registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5724
          • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe
            C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe /update /restart /peruser /childprocess /extractFilesWithLessThreadCount /renameReplaceOneDriveExe /renameReplaceODSUExe /removeNonCurrentVersions /enableODSUReportingMode
            3⤵
            • Executes dropped EXE
            • Modifies system executable filetype association
            • Adds Run key to start application
            • Checks system information in the registry
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:6024
            • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\FileSyncConfig.exe
              "C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\FileSyncConfig.exe"
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops desktop.ini file(s)
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              PID:5548
            • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe
              /updateInstalled /background
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Modifies system executable filetype association
              • Checks system information in the registry
              • System Location Discovery: System Language Discovery
              • Modifies Internet Explorer settings
              • Modifies registry class
              • Suspicious behavior: AddClipboardFormatListener
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of SetWindowsHookEx
              PID:1976
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
        1⤵
        • Enumerates system info in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1100
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff825113cb8,0x7ff825113cc8,0x7ff825113cd8
          2⤵
            PID:3188
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1896,615574395342890393,14234123663007217445,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1916 /prefetch:2
            2⤵
              PID:1180
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1896,615574395342890393,14234123663007217445,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2340 /prefetch:3
              2⤵
              • Downloads MZ/PE file
              • Suspicious behavior: EnumeratesProcesses
              PID:1596
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1896,615574395342890393,14234123663007217445,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2576 /prefetch:8
              2⤵
                PID:2396
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,615574395342890393,14234123663007217445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:1
                2⤵
                  PID:2840
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,615574395342890393,14234123663007217445,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:1
                  2⤵
                    PID:896
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,615574395342890393,14234123663007217445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:1
                    2⤵
                      PID:660
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,615574395342890393,14234123663007217445,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4076 /prefetch:1
                      2⤵
                        PID:2132
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,615574395342890393,14234123663007217445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:1
                        2⤵
                          PID:3496
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,615574395342890393,14234123663007217445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:1
                          2⤵
                            PID:4076
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,615574395342890393,14234123663007217445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:1
                            2⤵
                              PID:4080
                            • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1896,615574395342890393,14234123663007217445,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5800 /prefetch:8
                              2⤵
                                PID:896
                              • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1896,615574395342890393,14234123663007217445,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5800 /prefetch:8
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:1516
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,615574395342890393,14234123663007217445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:1
                                2⤵
                                  PID:1772
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,615574395342890393,14234123663007217445,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:1
                                  2⤵
                                    PID:3176
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1896,615574395342890393,14234123663007217445,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5892 /prefetch:8
                                    2⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:332
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,615574395342890393,14234123663007217445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:1
                                    2⤵
                                      PID:5332
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,615574395342890393,14234123663007217445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6168 /prefetch:1
                                      2⤵
                                        PID:5524
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,615574395342890393,14234123663007217445,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6152 /prefetch:1
                                        2⤵
                                          PID:5532
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,615574395342890393,14234123663007217445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:1
                                          2⤵
                                            PID:3688
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,615574395342890393,14234123663007217445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3944 /prefetch:1
                                            2⤵
                                              PID:5356
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,615574395342890393,14234123663007217445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6008 /prefetch:1
                                              2⤵
                                                PID:5324
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1896,615574395342890393,14234123663007217445,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6324 /prefetch:8
                                                2⤵
                                                  PID:5428
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1896,615574395342890393,14234123663007217445,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6352 /prefetch:8
                                                  2⤵
                                                    PID:5676
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1896,615574395342890393,14234123663007217445,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6512 /prefetch:8
                                                    2⤵
                                                    • Subvert Trust Controls: Mark-of-the-Web Bypass
                                                    • NTFS ADS
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:4124
                                                  • C:\Users\Admin\Downloads\WarzoneRAT (1).exe
                                                    "C:\Users\Admin\Downloads\WarzoneRAT (1).exe"
                                                    2⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetThreadContext
                                                    • NTFS ADS
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:5784
                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF1ED.tmp"
                                                      3⤵
                                                      • System Location Discovery: System Language Discovery
                                                      • Scheduled Task/Job: Scheduled Task
                                                      PID:5516
                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                      3⤵
                                                        PID:5952
                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                        3⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:2412
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,615574395342890393,14234123663007217445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6412 /prefetch:1
                                                      2⤵
                                                        PID:792
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1896,615574395342890393,14234123663007217445,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5852 /prefetch:8
                                                        2⤵
                                                          PID:5724
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1896,615574395342890393,14234123663007217445,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4052 /prefetch:8
                                                          2⤵
                                                            PID:5864
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1896,615574395342890393,14234123663007217445,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4648 /prefetch:8
                                                            2⤵
                                                            • Subvert Trust Controls: Mark-of-the-Web Bypass
                                                            • NTFS ADS
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:3676
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1896,615574395342890393,14234123663007217445,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7136 /prefetch:1
                                                            2⤵
                                                              PID:4456
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1896,615574395342890393,14234123663007217445,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6488 /prefetch:8
                                                              2⤵
                                                                PID:5852
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1896,615574395342890393,14234123663007217445,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6476 /prefetch:8
                                                                2⤵
                                                                • Subvert Trust Controls: Mark-of-the-Web Bypass
                                                                • NTFS ADS
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:4068
                                                              • C:\Users\Admin\Downloads\PolyRansom.exe
                                                                "C:\Users\Admin\Downloads\PolyRansom.exe"
                                                                2⤵
                                                                • Executes dropped EXE
                                                                • Adds Run key to start application
                                                                • System Location Discovery: System Language Discovery
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:1556
                                                                • C:\Users\Admin\gAAAEksg\QAAAccQE.exe
                                                                  "C:\Users\Admin\gAAAEksg\QAAAccQE.exe"
                                                                  3⤵
                                                                  • Executes dropped EXE
                                                                  • Adds Run key to start application
                                                                  PID:5144
                                                                • C:\ProgramData\mKMQcsUk\lSMsYgEg.exe
                                                                  "C:\ProgramData\mKMQcsUk\lSMsYgEg.exe"
                                                                  3⤵
                                                                  • Executes dropped EXE
                                                                  • Adds Run key to start application
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:4956
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /c "C:\Users\Admin\Downloads\PolyRansom"
                                                                  3⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:2740
                                                                  • C:\Users\Admin\Downloads\PolyRansom.exe
                                                                    C:\Users\Admin\Downloads\PolyRansom
                                                                    4⤵
                                                                    • Executes dropped EXE
                                                                    • System Location Discovery: System Language Discovery
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    PID:392
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /c "C:\Users\Admin\Downloads\PolyRansom"
                                                                      5⤵
                                                                        PID:1904
                                                                        • C:\Users\Admin\Downloads\PolyRansom.exe
                                                                          C:\Users\Admin\Downloads\PolyRansom
                                                                          6⤵
                                                                          • Executes dropped EXE
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:4696
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /c "C:\Users\Admin\Downloads\PolyRansom"
                                                                            7⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:2324
                                                                            • C:\Users\Admin\Downloads\PolyRansom.exe
                                                                              C:\Users\Admin\Downloads\PolyRansom
                                                                              8⤵
                                                                              • Executes dropped EXE
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:1312
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                C:\Windows\system32\cmd.exe /c "C:\Users\Admin\Downloads\PolyRansom"
                                                                                9⤵
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:4376
                                                                                • C:\Users\Admin\Downloads\PolyRansom.exe
                                                                                  C:\Users\Admin\Downloads\PolyRansom
                                                                                  10⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:3832
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\Downloads\PolyRansom"
                                                                                    11⤵
                                                                                      PID:644
                                                                                      • C:\Users\Admin\Downloads\PolyRansom.exe
                                                                                        C:\Users\Admin\Downloads\PolyRansom
                                                                                        12⤵
                                                                                        • Executes dropped EXE
                                                                                        PID:5852
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          C:\Windows\system32\cmd.exe /c "C:\Users\Admin\Downloads\PolyRansom"
                                                                                          13⤵
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:4248
                                                                                          • C:\Users\Admin\Downloads\PolyRansom.exe
                                                                                            C:\Users\Admin\Downloads\PolyRansom
                                                                                            14⤵
                                                                                            • Executes dropped EXE
                                                                                            PID:5952
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              C:\Windows\system32\cmd.exe /c "C:\Users\Admin\Downloads\PolyRansom"
                                                                                              15⤵
                                                                                                PID:5472
                                                                                                • C:\Users\Admin\Downloads\PolyRansom.exe
                                                                                                  C:\Users\Admin\Downloads\PolyRansom
                                                                                                  16⤵
                                                                                                  • Executes dropped EXE
                                                                                                  PID:1224
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\Downloads\PolyRansom"
                                                                                                    17⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    PID:5848
                                                                                                    • C:\Users\Admin\Downloads\PolyRansom.exe
                                                                                                      C:\Users\Admin\Downloads\PolyRansom
                                                                                                      18⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      PID:2920
                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                        C:\Windows\system32\cmd.exe /c "C:\Users\Admin\Downloads\PolyRansom"
                                                                                                        19⤵
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:6052
                                                                                                        • C:\Users\Admin\Downloads\PolyRansom.exe
                                                                                                          C:\Users\Admin\Downloads\PolyRansom
                                                                                                          20⤵
                                                                                                          • Executes dropped EXE
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:5448
                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                            C:\Windows\system32\cmd.exe /c "C:\Users\Admin\Downloads\PolyRansom"
                                                                                                            21⤵
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:2868
                                                                                                            • C:\Users\Admin\Downloads\PolyRansom.exe
                                                                                                              C:\Users\Admin\Downloads\PolyRansom
                                                                                                              22⤵
                                                                                                              • Executes dropped EXE
                                                                                                              PID:5176
                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                C:\Windows\system32\cmd.exe /c "C:\Users\Admin\Downloads\PolyRansom"
                                                                                                                23⤵
                                                                                                                  PID:4840
                                                                                                                  • C:\Users\Admin\Downloads\PolyRansom.exe
                                                                                                                    C:\Users\Admin\Downloads\PolyRansom
                                                                                                                    24⤵
                                                                                                                      PID:3320
                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                        C:\Windows\system32\cmd.exe /c "C:\Users\Admin\Downloads\PolyRansom"
                                                                                                                        25⤵
                                                                                                                          PID:3668
                                                                                                                          • C:\Users\Admin\Downloads\PolyRansom.exe
                                                                                                                            C:\Users\Admin\Downloads\PolyRansom
                                                                                                                            26⤵
                                                                                                                              PID:4824
                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                C:\Windows\system32\cmd.exe /c "C:\Users\Admin\Downloads\PolyRansom"
                                                                                                                                27⤵
                                                                                                                                  PID:2324
                                                                                                                                  • C:\Users\Admin\Downloads\PolyRansom.exe
                                                                                                                                    C:\Users\Admin\Downloads\PolyRansom
                                                                                                                                    28⤵
                                                                                                                                      PID:908
                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                        C:\Windows\system32\cmd.exe /c "C:\Users\Admin\Downloads\PolyRansom"
                                                                                                                                        29⤵
                                                                                                                                          PID:432
                                                                                                                                          • C:\Users\Admin\Downloads\PolyRansom.exe
                                                                                                                                            C:\Users\Admin\Downloads\PolyRansom
                                                                                                                                            30⤵
                                                                                                                                              PID:5236
                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                C:\Windows\system32\cmd.exe /c "C:\Users\Admin\Downloads\PolyRansom"
                                                                                                                                                31⤵
                                                                                                                                                  PID:4612
                                                                                                                                                  • C:\Users\Admin\Downloads\PolyRansom.exe
                                                                                                                                                    C:\Users\Admin\Downloads\PolyRansom
                                                                                                                                                    32⤵
                                                                                                                                                      PID:2332
                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                        C:\Windows\system32\cmd.exe /c "C:\Users\Admin\Downloads\PolyRansom"
                                                                                                                                                        33⤵
                                                                                                                                                          PID:1168
                                                                                                                                                          • C:\Users\Admin\Downloads\PolyRansom.exe
                                                                                                                                                            C:\Users\Admin\Downloads\PolyRansom
                                                                                                                                                            34⤵
                                                                                                                                                              PID:6004
                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                C:\Windows\system32\cmd.exe /c "C:\Users\Admin\Downloads\PolyRansom"
                                                                                                                                                                35⤵
                                                                                                                                                                  PID:5180
                                                                                                                                                                  • C:\Users\Admin\Downloads\PolyRansom.exe
                                                                                                                                                                    C:\Users\Admin\Downloads\PolyRansom
                                                                                                                                                                    36⤵
                                                                                                                                                                      PID:2548
                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                        C:\Windows\system32\cmd.exe /c "C:\Users\Admin\Downloads\PolyRansom"
                                                                                                                                                                        37⤵
                                                                                                                                                                          PID:6124
                                                                                                                                                                          • C:\Users\Admin\Downloads\PolyRansom.exe
                                                                                                                                                                            C:\Users\Admin\Downloads\PolyRansom
                                                                                                                                                                            38⤵
                                                                                                                                                                              PID:5884
                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                C:\Windows\system32\cmd.exe /c "C:\Users\Admin\Downloads\PolyRansom"
                                                                                                                                                                                39⤵
                                                                                                                                                                                  PID:4324
                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                              37⤵
                                                                                                                                                                              • Modifies registry key
                                                                                                                                                                              PID:5256
                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                              37⤵
                                                                                                                                                                              • Modifies registry key
                                                                                                                                                                              PID:2212
                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                              reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                              37⤵
                                                                                                                                                                              • Modifies registry key
                                                                                                                                                                              PID:940
                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\xAsgQsAw.bat" "C:\Users\Admin\Downloads\PolyRansom.exe""
                                                                                                                                                                              37⤵
                                                                                                                                                                                PID:3020
                                                                                                                                                                                • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                  cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                                  38⤵
                                                                                                                                                                                    PID:5964
                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                              35⤵
                                                                                                                                                                              • Modifies registry key
                                                                                                                                                                              PID:5048
                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                              35⤵
                                                                                                                                                                              • Modifies registry key
                                                                                                                                                                              PID:2044
                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                              reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                              35⤵
                                                                                                                                                                              • Modifies registry key
                                                                                                                                                                              PID:2440
                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HUYscksY.bat" "C:\Users\Admin\Downloads\PolyRansom.exe""
                                                                                                                                                                              35⤵
                                                                                                                                                                                PID:2424
                                                                                                                                                                                • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                  cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                                  36⤵
                                                                                                                                                                                    PID:248
                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                              33⤵
                                                                                                                                                                              • Modifies registry key
                                                                                                                                                                              PID:4024
                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                              33⤵
                                                                                                                                                                              • Modifies registry key
                                                                                                                                                                              PID:5184
                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                              reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                              33⤵
                                                                                                                                                                              • Modifies registry key
                                                                                                                                                                              PID:4868
                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XWcUUQwA.bat" "C:\Users\Admin\Downloads\PolyRansom.exe""
                                                                                                                                                                              33⤵
                                                                                                                                                                                PID:5688
                                                                                                                                                                                • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                  cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                                  34⤵
                                                                                                                                                                                    PID:3136
                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                              31⤵
                                                                                                                                                                              • Modifies registry key
                                                                                                                                                                              PID:5224
                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                              31⤵
                                                                                                                                                                              • Modifies registry key
                                                                                                                                                                              PID:3320
                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                              reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                              31⤵
                                                                                                                                                                              • Modifies registry key
                                                                                                                                                                              PID:5244
                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\jigccwMw.bat" "C:\Users\Admin\Downloads\PolyRansom.exe""
                                                                                                                                                                              31⤵
                                                                                                                                                                                PID:5976
                                                                                                                                                                                • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                  cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                                  32⤵
                                                                                                                                                                                    PID:6132
                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                              29⤵
                                                                                                                                                                              • Modifies registry key
                                                                                                                                                                              PID:2044
                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                              29⤵
                                                                                                                                                                              • Modifies registry key
                                                                                                                                                                              PID:428
                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                              reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                              29⤵
                                                                                                                                                                              • Modifies registry key
                                                                                                                                                                              PID:2868
                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\aYAwAwMc.bat" "C:\Users\Admin\Downloads\PolyRansom.exe""
                                                                                                                                                                              29⤵
                                                                                                                                                                                PID:1324
                                                                                                                                                                                • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                  cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                                  30⤵
                                                                                                                                                                                    PID:1896
                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                              27⤵
                                                                                                                                                                              • Modifies registry key
                                                                                                                                                                              PID:2984
                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                              27⤵
                                                                                                                                                                              • Modifies registry key
                                                                                                                                                                              PID:4328
                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                              reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                              27⤵
                                                                                                                                                                              • Modifies registry key
                                                                                                                                                                              PID:2696
                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\SYIMgUgo.bat" "C:\Users\Admin\Downloads\PolyRansom.exe""
                                                                                                                                                                              27⤵
                                                                                                                                                                                PID:6052
                                                                                                                                                                                • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                  28⤵
                                                                                                                                                                                    PID:5756
                                                                                                                                                                                  • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                    cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                                    28⤵
                                                                                                                                                                                      PID:5320
                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                                25⤵
                                                                                                                                                                                • Modifies registry key
                                                                                                                                                                                PID:1312
                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                                25⤵
                                                                                                                                                                                • Modifies registry key
                                                                                                                                                                                PID:2212
                                                                                                                                                                                • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                  26⤵
                                                                                                                                                                                    PID:5152
                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                  reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                                  25⤵
                                                                                                                                                                                  • Modifies registry key
                                                                                                                                                                                  PID:940
                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\YyQooQwg.bat" "C:\Users\Admin\Downloads\PolyRansom.exe""
                                                                                                                                                                                  25⤵
                                                                                                                                                                                    PID:2336
                                                                                                                                                                                    • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                      cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                                      26⤵
                                                                                                                                                                                        PID:392
                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                  reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                                  23⤵
                                                                                                                                                                                  • Modifies registry key
                                                                                                                                                                                  PID:5772
                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                  reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                                  23⤵
                                                                                                                                                                                  • Modifies registry key
                                                                                                                                                                                  PID:1672
                                                                                                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                    24⤵
                                                                                                                                                                                      PID:2024
                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                    reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                                    23⤵
                                                                                                                                                                                    • Modifies registry key
                                                                                                                                                                                    PID:2320
                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XqEIwYkU.bat" "C:\Users\Admin\Downloads\PolyRansom.exe""
                                                                                                                                                                                    23⤵
                                                                                                                                                                                      PID:4816
                                                                                                                                                                                      • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                        cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                                        24⤵
                                                                                                                                                                                          PID:1688
                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                    reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                                    21⤵
                                                                                                                                                                                    • Modifies visibility of file extensions in Explorer
                                                                                                                                                                                    • Modifies registry key
                                                                                                                                                                                    PID:4464
                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                    reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                                    21⤵
                                                                                                                                                                                    • Modifies registry key
                                                                                                                                                                                    PID:5756
                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                    reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                                    21⤵
                                                                                                                                                                                    • UAC bypass
                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                    • Modifies registry key
                                                                                                                                                                                    PID:2740
                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\bmEcsooI.bat" "C:\Users\Admin\Downloads\PolyRansom.exe""
                                                                                                                                                                                    21⤵
                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                    PID:4700
                                                                                                                                                                                    • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                      cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                                      22⤵
                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                      PID:3916
                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                                19⤵
                                                                                                                                                                                • Modifies visibility of file extensions in Explorer
                                                                                                                                                                                • Modifies registry key
                                                                                                                                                                                PID:1312
                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                                19⤵
                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                • Modifies registry key
                                                                                                                                                                                PID:5028
                                                                                                                                                                                • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                  20⤵
                                                                                                                                                                                    PID:4824
                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                  reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                                  19⤵
                                                                                                                                                                                  • UAC bypass
                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                  • Modifies registry key
                                                                                                                                                                                  PID:5152
                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DiswoUYw.bat" "C:\Users\Admin\Downloads\PolyRansom.exe""
                                                                                                                                                                                  19⤵
                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                  PID:3212
                                                                                                                                                                                  • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                    cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                                    20⤵
                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                    PID:4080
                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                              17⤵
                                                                                                                                                                              • Modifies visibility of file extensions in Explorer
                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                              • Modifies registry key
                                                                                                                                                                              PID:5976
                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                              17⤵
                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                              • Modifies registry key
                                                                                                                                                                              PID:5932
                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                              reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                              17⤵
                                                                                                                                                                              • UAC bypass
                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                              • Modifies registry key
                                                                                                                                                                              PID:2024
                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\rekEcMgk.bat" "C:\Users\Admin\Downloads\PolyRansom.exe""
                                                                                                                                                                              17⤵
                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                              PID:5048
                                                                                                                                                                              • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                                18⤵
                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                PID:5852
                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                          reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                          15⤵
                                                                                                                                                                          • Modifies visibility of file extensions in Explorer
                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                          • Modifies registry key
                                                                                                                                                                          PID:4524
                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                          reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                          15⤵
                                                                                                                                                                          • Modifies registry key
                                                                                                                                                                          PID:5756
                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                          reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                          15⤵
                                                                                                                                                                          • UAC bypass
                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                          • Modifies registry key
                                                                                                                                                                          PID:1824
                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MUUoUsIE.bat" "C:\Users\Admin\Downloads\PolyRansom.exe""
                                                                                                                                                                          15⤵
                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                          PID:5320
                                                                                                                                                                          • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                            cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                            16⤵
                                                                                                                                                                              PID:3444
                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                        reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                        13⤵
                                                                                                                                                                        • Modifies visibility of file extensions in Explorer
                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                        • Modifies registry key
                                                                                                                                                                        PID:4824
                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                        reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                        13⤵
                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                        • Modifies registry key
                                                                                                                                                                        PID:2548
                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                        reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                        13⤵
                                                                                                                                                                        • UAC bypass
                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                        • Modifies registry key
                                                                                                                                                                        PID:3124
                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\gaIUQUcE.bat" "C:\Users\Admin\Downloads\PolyRansom.exe""
                                                                                                                                                                        13⤵
                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                        PID:1148
                                                                                                                                                                        • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                          cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                          14⤵
                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                          PID:4528
                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                    reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                    11⤵
                                                                                                                                                                    • Modifies visibility of file extensions in Explorer
                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                    • Modifies registry key
                                                                                                                                                                    PID:5956
                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                    reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                    11⤵
                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                    • Modifies registry key
                                                                                                                                                                    PID:5200
                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                    reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                    11⤵
                                                                                                                                                                    • UAC bypass
                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                    • Modifies registry key
                                                                                                                                                                    PID:3288
                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OWwIMEYo.bat" "C:\Users\Admin\Downloads\PolyRansom.exe""
                                                                                                                                                                    11⤵
                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                    PID:2440
                                                                                                                                                                    • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                      cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                      12⤵
                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                      PID:1672
                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                9⤵
                                                                                                                                                                • Modifies visibility of file extensions in Explorer
                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                • Modifies registry key
                                                                                                                                                                PID:5416
                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                9⤵
                                                                                                                                                                • Modifies registry key
                                                                                                                                                                PID:5468
                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                9⤵
                                                                                                                                                                • UAC bypass
                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                • Modifies registry key
                                                                                                                                                                PID:5844
                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JegcUoYw.bat" "C:\Users\Admin\Downloads\PolyRansom.exe""
                                                                                                                                                                9⤵
                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                PID:5452
                                                                                                                                                                • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                  cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                  10⤵
                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                  PID:2836
                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                            reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                            7⤵
                                                                                                                                                            • Modifies visibility of file extensions in Explorer
                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                            • Modifies registry key
                                                                                                                                                            PID:6000
                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                            reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                            7⤵
                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                            • Modifies registry key
                                                                                                                                                            PID:6128
                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                            reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                            7⤵
                                                                                                                                                            • UAC bypass
                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                            • Modifies registry key
                                                                                                                                                            PID:1324
                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ToMwIYMg.bat" "C:\Users\Admin\Downloads\PolyRansom.exe""
                                                                                                                                                            7⤵
                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                            PID:4708
                                                                                                                                                            • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                              cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                              8⤵
                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                              PID:5688
                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                        reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                        5⤵
                                                                                                                                                        • Modifies visibility of file extensions in Explorer
                                                                                                                                                        • Modifies registry key
                                                                                                                                                        PID:5460
                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                        reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                        5⤵
                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                        • Modifies registry key
                                                                                                                                                        PID:3156
                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                        reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                        5⤵
                                                                                                                                                        • UAC bypass
                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                        • Modifies registry key
                                                                                                                                                        PID:2868
                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\vOEcAMMY.bat" "C:\Users\Admin\Downloads\PolyRansom.exe""
                                                                                                                                                        5⤵
                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                        PID:2544
                                                                                                                                                        • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                          cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                          6⤵
                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                          PID:5928
                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                    reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                    3⤵
                                                                                                                                                    • Modifies visibility of file extensions in Explorer
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    • Modifies registry key
                                                                                                                                                    PID:5520
                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                    reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                    3⤵
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    • Modifies registry key
                                                                                                                                                    PID:2828
                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                    reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                    3⤵
                                                                                                                                                    • UAC bypass
                                                                                                                                                    • Modifies registry key
                                                                                                                                                    PID:5844
                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JmYEkQUA.bat" "C:\Users\Admin\Downloads\PolyRansom.exe""
                                                                                                                                                    3⤵
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    PID:5180
                                                                                                                                                    • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                      cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                      4⤵
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      PID:5884
                                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1896,615574395342890393,14234123663007217445,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=6240 /prefetch:2
                                                                                                                                                  2⤵
                                                                                                                                                    PID:6100
                                                                                                                                                • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                  1⤵
                                                                                                                                                    PID:2040
                                                                                                                                                  • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                    1⤵
                                                                                                                                                      PID:4792
                                                                                                                                                    • C:\Windows\system32\BackgroundTransferHost.exe
                                                                                                                                                      "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.13
                                                                                                                                                      1⤵
                                                                                                                                                        PID:5076
                                                                                                                                                      • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                                                                                                                        "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7RSt4YkF6Nlk2c1UxMjg5YlM2cWw0VlJMYmtqZkJVR1RNSnNqckhyNDRpST0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7OEE2OUQzNDUtRDU2NC00NjNjLUFGRjEtQTY5RDlFNTMwRjk2fSIgdmVyc2lvbj0iMTIzLjAuNjMxMi4xMjMiIG5leHR2ZXJzaW9uPSIiIGxhbmc9ImVuIiBicmFuZD0iR0dMUyIgY2xpZW50PSIiIGluc3RhbGxhZ2U9IjIiIGluc3RhbGxkYXRldGltZT0iMTczODk1NDk2OSIgb29iZV9pbnN0YWxsX3RpbWU9IjEzMzgzNDI3NjY5NTc5MDAwMCI-PGV2ZW50IGV2ZW50dHlwZT0iMzEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjIxNzk4NjIiIHN5c3RlbV91cHRpbWVfdGlja3M9IjUyMTk1OTExMzEiLz48L2FwcD48L3JlcXVlc3Q-
                                                                                                                                                        1⤵
                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                        PID:1412

                                                                                                                                                      Network

                                                                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                                                                      Replay Monitor

                                                                                                                                                      Loading Replay Monitor...

                                                                                                                                                      Downloads

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                        Filesize

                                                                                                                                                        152B

                                                                                                                                                        MD5

                                                                                                                                                        a5c50667b93d53509e48e6633581bc25

                                                                                                                                                        SHA1

                                                                                                                                                        0ef19847e939396eaac7edfbb606b697913ae37a

                                                                                                                                                        SHA256

                                                                                                                                                        85dab06def42b94730d837dc66b0a41334663fafd0b9353826875eacddc0a141

                                                                                                                                                        SHA512

                                                                                                                                                        d69dc11445460972b9802d572977e7f43150cc35c99d7da1efe050916676df92c7f837a48166da81603eb71d295fc1bbadfd07c9f3236885f8ccb3f4352fa1e4

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                        Filesize

                                                                                                                                                        152B

                                                                                                                                                        MD5

                                                                                                                                                        6f5d0c79725ae07c3fd4bdaa16d730ed

                                                                                                                                                        SHA1

                                                                                                                                                        38b1193cd01a7b7f9b462920e258bc2d6e7c80e4

                                                                                                                                                        SHA256

                                                                                                                                                        1969faf7698d42438d6308fcd633257f200878a6af9d80004d7a1604d8a7889d

                                                                                                                                                        SHA512

                                                                                                                                                        61e374615be0497285ec55047924914f983283ad10c74facb5d94b82836cab94cb670c59dca842aab7ab3efce6369fa3e4e74b34597225d475523a4bf52afd1f

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\14da5d99-92d9-4ab5-ba1e-9f3379c3c094.tmp

                                                                                                                                                        Filesize

                                                                                                                                                        1KB

                                                                                                                                                        MD5

                                                                                                                                                        c067665e95102f5d3209af078013209a

                                                                                                                                                        SHA1

                                                                                                                                                        dda7d426ed16639f855529ec1b22235c973c9302

                                                                                                                                                        SHA256

                                                                                                                                                        44f907d836fec1fa4d158aaffea43e5ac6d35cd21c7f03cf011cc42a69c1ea14

                                                                                                                                                        SHA512

                                                                                                                                                        8ea0e117e87d18bc5987e8f3da6fb224c7c705a662ac8af24fe731f46b4786f3be8f9a20bc52706f50621ba10b1678f24c138cd412c04f1b59a5a07b82031e8c

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00001d

                                                                                                                                                        Filesize

                                                                                                                                                        211KB

                                                                                                                                                        MD5

                                                                                                                                                        a933a1a402775cfa94b6bee0963f4b46

                                                                                                                                                        SHA1

                                                                                                                                                        18aa7b02f933c753989ba3d16698a5ee3a4d9420

                                                                                                                                                        SHA256

                                                                                                                                                        146581f0b3fbe00026ee3ebe68797b0e57f39d1d8aecc99fdc3290e9cfadc4fc

                                                                                                                                                        SHA512

                                                                                                                                                        d83da3c97ffd78c42f49b7bfb50525e7c964004b4b7d9cba839c0d8bf3a5fe0424be3b3782e33c57debc6b13b5420a3fa096643c8b7376b3accfb1bc4e7d7368

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                        Filesize

                                                                                                                                                        3KB

                                                                                                                                                        MD5

                                                                                                                                                        7ef2d853b5ce418dab1048aa74df0a4f

                                                                                                                                                        SHA1

                                                                                                                                                        29cdbe83d2f9f8ca15913dac5bbd04bff7ad0410

                                                                                                                                                        SHA256

                                                                                                                                                        484b239bc50aa25a20e153e0ac33177e766500c088cbdfee64ab58472245297e

                                                                                                                                                        SHA512

                                                                                                                                                        b184c213911a7a873848c1625954ea9faf36c2e72bce194e530215de15e294f3f58a54a255fa942787703858cb71076c9e99d9289521f8785c5934c4119bc333

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                        Filesize

                                                                                                                                                        3KB

                                                                                                                                                        MD5

                                                                                                                                                        44c3e82384a85e4778d3479afe16e6ab

                                                                                                                                                        SHA1

                                                                                                                                                        6a0a3e124296285d984d8a7fa034d94e0523aed6

                                                                                                                                                        SHA256

                                                                                                                                                        880492e717ff717594c392f41072c93aa39f65dced2a3669777518634ce55d2e

                                                                                                                                                        SHA512

                                                                                                                                                        1e4e4bf875931e2f54d8fe4be93e75e65dbef9bb02c47ced30c66a48c07636231a02b223ff8d928b7bc1684a6356e42192a38f925d4453b2654082b24b8ac552

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                        Filesize

                                                                                                                                                        111B

                                                                                                                                                        MD5

                                                                                                                                                        807419ca9a4734feaf8d8563a003b048

                                                                                                                                                        SHA1

                                                                                                                                                        a723c7d60a65886ffa068711f1e900ccc85922a6

                                                                                                                                                        SHA256

                                                                                                                                                        aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631

                                                                                                                                                        SHA512

                                                                                                                                                        f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                        Filesize

                                                                                                                                                        800B

                                                                                                                                                        MD5

                                                                                                                                                        edf68ff3d2fded408012cc6f58c34ae8

                                                                                                                                                        SHA1

                                                                                                                                                        72b84caddb42bbd4c49856f73d0d28c69b2ef7f8

                                                                                                                                                        SHA256

                                                                                                                                                        0a6ddaf8e5fac2f0fb82f58e8a436954be6d49ae7deab8fa9b73527ffebe07a3

                                                                                                                                                        SHA512

                                                                                                                                                        f5167204e1ef2a5340c6b7602f704ead5ab348fcdab231bfb91cdaeca4882643b4ec70e25b0c7846856e4beca095eeb7d7300b047920c6ab54c17ae604291238

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                        Filesize

                                                                                                                                                        6KB

                                                                                                                                                        MD5

                                                                                                                                                        1dcf9171fbd3c3b16624ed8c0ab4dbff

                                                                                                                                                        SHA1

                                                                                                                                                        dd469699a09b591a36fccce0d0fb2a6a4c3fb476

                                                                                                                                                        SHA256

                                                                                                                                                        adddb177dbdfbbe02b16f5f83754c93aa3e17d8b82923e6f0dd54f496f96a42c

                                                                                                                                                        SHA512

                                                                                                                                                        4cc0c1a96d1a837aa8a9d9f4a7968a53caa1446d2fb51b2f01c01b4ae9f681af344cb42ed50e9ec8d6783c0ccfe91df0b7f1ae392d1bd941894b3c44f6cd13ce

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                        Filesize

                                                                                                                                                        6KB

                                                                                                                                                        MD5

                                                                                                                                                        31ff0624759faac425e6775efa5fac65

                                                                                                                                                        SHA1

                                                                                                                                                        cef6c3058a81ab49b8965583753444acabcdc727

                                                                                                                                                        SHA256

                                                                                                                                                        15adb126b627de3b970fcc5d23d92700171e8775f5f6b4600a4bc40f168d2d78

                                                                                                                                                        SHA512

                                                                                                                                                        b344caa474495c1e62532609a8daeaf348cd30cd6e1564f8f4a4aa637b2febff07172fdfe64137e43b1ce981d012abad6344acd2f16c136da361e989dfebb19b

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                        Filesize

                                                                                                                                                        5KB

                                                                                                                                                        MD5

                                                                                                                                                        0e40f7f5e392407140a877f0cbf4774d

                                                                                                                                                        SHA1

                                                                                                                                                        074f579a703cc9d2a44221e27108b730a186b1a7

                                                                                                                                                        SHA256

                                                                                                                                                        e11de10e61bb3ac51330df30bf814f806c70f0e331ba43b43e8bf3c4dc8e5404

                                                                                                                                                        SHA512

                                                                                                                                                        9e73e06127817d37ed95ef9c4b3841009026936ac293fea482a2d748d89641d4d1e89fd43e45241978de0a21c3bb2604fea3f28174be9f0be7fcf151a46cb98d

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                        Filesize

                                                                                                                                                        6KB

                                                                                                                                                        MD5

                                                                                                                                                        cb34abf64b12430ae8d32359a8dcdd1e

                                                                                                                                                        SHA1

                                                                                                                                                        7133688adbbcd71b2b2245554c8088c447c89298

                                                                                                                                                        SHA256

                                                                                                                                                        e7bcf60cd940be75e516e38ec22cc23d5ac7598bd5fe7dc72607268fa89d80f0

                                                                                                                                                        SHA512

                                                                                                                                                        a77800697b09c43d33f3208faa7aa4fdcbec437cb9c13943bc8b20d5b2feac8f23e5196bcf011063efec502e9effa30b552aaf8f6aad7b8d24180f68bfceca85

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                        Filesize

                                                                                                                                                        1KB

                                                                                                                                                        MD5

                                                                                                                                                        b4fe5218e6c67b1ed4178cc41974c480

                                                                                                                                                        SHA1

                                                                                                                                                        89f830ddf6599c84c42f4dab61d9f54ea5bea6b9

                                                                                                                                                        SHA256

                                                                                                                                                        703b76e7ed4512f25daa93ec3dce22af110935936773fdd837a307abf8e71d78

                                                                                                                                                        SHA512

                                                                                                                                                        f875357278aaeb023cb9039b2f78c5b0f2ee6feb498c253ba8e65d04657726b9ae1b4731e52df8fab02e17f2cd6b627df4921cdbcb32e53ec6d8a6b4558706bd

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                        Filesize

                                                                                                                                                        1KB

                                                                                                                                                        MD5

                                                                                                                                                        45c383a0e9fb71db2fce67b855f5bed4

                                                                                                                                                        SHA1

                                                                                                                                                        38361c46ce8d1638116e92c768910d7fe181eacd

                                                                                                                                                        SHA256

                                                                                                                                                        72ba73cd30ec0dc915b090695a8437199e5ecb040c1c7add56a6efb0e14738bd

                                                                                                                                                        SHA512

                                                                                                                                                        73cda5089b61e73e83e3667586c748d6215b9df2187172d62c5b234afa235a8e84081e5b37eea9f23f07d8fc78f9a94a38f6080cdc79e96d145524a5245be428

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                        Filesize

                                                                                                                                                        1KB

                                                                                                                                                        MD5

                                                                                                                                                        4802d2f1f9d2319b14e78a9a38bdcb75

                                                                                                                                                        SHA1

                                                                                                                                                        5ca261e4e3122cd8d4045f3ba67bbb8f02d6f7ff

                                                                                                                                                        SHA256

                                                                                                                                                        3916db65242ac1e8dda2634432dbe4fc22d2662eab4f3360af7f15f54cf57220

                                                                                                                                                        SHA512

                                                                                                                                                        33ade43ca2476e75f1b48e9480df628abbab0f9e7937268e5b52d764a4e308144f00073ad2658aee902e62e7c956cf54719a98d863d0c582c9b160448e16f98a

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                        Filesize

                                                                                                                                                        1KB

                                                                                                                                                        MD5

                                                                                                                                                        5ce32bc9e34bd81b4d8947f785e90bb7

                                                                                                                                                        SHA1

                                                                                                                                                        2965c93f5a3d8d2f5d061fd41995489d8e05b515

                                                                                                                                                        SHA256

                                                                                                                                                        1f57e634147979017de005edbc0573568c49b4184956fb146fbdb379b5211264

                                                                                                                                                        SHA512

                                                                                                                                                        51ff1b091ba572b478d324ac4e129a41f1ceb16403edb684d2faec27dd6b52e3f8a3d6610fca11ef949a8e81a1f18dc527530d5a7d806dd846c29b5f1c4f8c89

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                        Filesize

                                                                                                                                                        1KB

                                                                                                                                                        MD5

                                                                                                                                                        f93263fb621d8b058d19e1a58b457b1c

                                                                                                                                                        SHA1

                                                                                                                                                        904e697dc24bc85289897cd29a301f9489f04612

                                                                                                                                                        SHA256

                                                                                                                                                        d202bd682a2b5836b483d0ea0d331638c0241697ef0328bef5e09844e36bd0cb

                                                                                                                                                        SHA512

                                                                                                                                                        302d2307c415fdf9c561c8df5abba48b4a67dc32a1d65bfc32036135f4b3926596c9aece36233b7aceca2122ca2efb1f89b5d2e1bcd9ae26bff6fbd66350ef26

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                        Filesize

                                                                                                                                                        1KB

                                                                                                                                                        MD5

                                                                                                                                                        bf4bc3dccfc517caae0088d4ca0c6e5e

                                                                                                                                                        SHA1

                                                                                                                                                        8a75d6756c5f89106fdff941d5224b8d7bb6a5eb

                                                                                                                                                        SHA256

                                                                                                                                                        4275e65cfd3244f25b4cbcb91f7695b42ac63b1f3147d4464610dcc80ee537d2

                                                                                                                                                        SHA512

                                                                                                                                                        90ca79ae21ef085d35bbfb5845bce135a50d29ce1b5b6bf047a6ded12e0b80548436472964d0c87963156f2143befd3a3ecefb650dad24320890862ad0e213ae

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe58726c.TMP

                                                                                                                                                        Filesize

                                                                                                                                                        1KB

                                                                                                                                                        MD5

                                                                                                                                                        b681c467253c8cd9ebfbd6e4a2512465

                                                                                                                                                        SHA1

                                                                                                                                                        43a6d9ac464b6b0b22da80cb5fa92dac78072b78

                                                                                                                                                        SHA256

                                                                                                                                                        b06e0c81193dacbef946a6206910ab66e28aef5a513228b04732c3a85931e88a

                                                                                                                                                        SHA512

                                                                                                                                                        2b00ef7ff882d54bbf1be6c8257588f92540bdff173ddac8f8c5a2420016c1a2822205c1a42edcc6cad9ae78b6629953a7cea6e965e264f69619301e82400a7a

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                        Filesize

                                                                                                                                                        16B

                                                                                                                                                        MD5

                                                                                                                                                        46295cac801e5d4857d09837238a6394

                                                                                                                                                        SHA1

                                                                                                                                                        44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                                                                                        SHA256

                                                                                                                                                        0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                                                                                        SHA512

                                                                                                                                                        8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                        Filesize

                                                                                                                                                        16B

                                                                                                                                                        MD5

                                                                                                                                                        206702161f94c5cd39fadd03f4014d98

                                                                                                                                                        SHA1

                                                                                                                                                        bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                                                                                                                        SHA256

                                                                                                                                                        1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                                                                                                                        SHA512

                                                                                                                                                        0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                        Filesize

                                                                                                                                                        11KB

                                                                                                                                                        MD5

                                                                                                                                                        88b7914bba7c3c38e82892a709f5061c

                                                                                                                                                        SHA1

                                                                                                                                                        74de60aacc094d308931b5d4dcddd1829081d90a

                                                                                                                                                        SHA256

                                                                                                                                                        7a57a6ae165a53d016e59a5e28c91c3e60a6654985d74ddc71058bfba8548306

                                                                                                                                                        SHA512

                                                                                                                                                        748869d926480e3cf7aecb308042fff85d3ccecb0b40a4aac8539a456e2da6d2a0de7dd31a933a4a4c37fc08a33622edf51891b829d83a5f56530d80f2a2ea3f

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                        Filesize

                                                                                                                                                        11KB

                                                                                                                                                        MD5

                                                                                                                                                        9903d74b5b4936cd9341af28c4c73419

                                                                                                                                                        SHA1

                                                                                                                                                        cece80a005e724bca7a74e5c8aefaf8dc88d4a4e

                                                                                                                                                        SHA256

                                                                                                                                                        38ef0cfb157d1352ec88041bf99617b52ddc2a2f2b27622490f1ab584db1370c

                                                                                                                                                        SHA512

                                                                                                                                                        0edf29b0309f0015d09c02db49ed596c39966ab2db4cfc03fbe23d03804882c019c9a779eeb09e9600573d275b3c560d1c5b2c7c70d6d030b71eff487f44b9dc

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                        Filesize

                                                                                                                                                        11KB

                                                                                                                                                        MD5

                                                                                                                                                        405fd76c1bea0ef216ce9af4086d7039

                                                                                                                                                        SHA1

                                                                                                                                                        806a7ee60ceb8ae23c5cdb3b926898604edf8c41

                                                                                                                                                        SHA256

                                                                                                                                                        90cdbb201dbf4b4d442c4309b37fbe97dbb96402a55a36c4e2c32ec94fd99994

                                                                                                                                                        SHA512

                                                                                                                                                        cd659743972964c1a4c19c9399dae052dd8a726b31a523758907cf0cf1e27a0ec433862b1d1a05b8260f59686568abb9d0bbf15dd8211b66ac41f46488c10150

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                        Filesize

                                                                                                                                                        10KB

                                                                                                                                                        MD5

                                                                                                                                                        85cb7c77146afceddf647e9b57b40d16

                                                                                                                                                        SHA1

                                                                                                                                                        94a82ef71efac61ddd3baf08262c299d2ee59776

                                                                                                                                                        SHA256

                                                                                                                                                        acb0739f89b782d8563b9758922d20d105af0363983cd219d1221c6fece3d3d0

                                                                                                                                                        SHA512

                                                                                                                                                        e41d047a1882ac25bfdc9df062d4af99dbe02015609ca69fc02912927425041296b42ccd5d68df5cf359756566fc0f431fde7fa1f332188a05ac7c7904da82b5

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\FileSyncClient.dll

                                                                                                                                                        Filesize

                                                                                                                                                        5.0MB

                                                                                                                                                        MD5

                                                                                                                                                        2df24cd5c96fb3fadf49e04c159d05f3

                                                                                                                                                        SHA1

                                                                                                                                                        4b46b34ee0741c52b438d5b9f97e6af14804ae6e

                                                                                                                                                        SHA256

                                                                                                                                                        3d0250f856970ff36862c99f3329a82be87b0de47923debefe21443c76cddf88

                                                                                                                                                        SHA512

                                                                                                                                                        a973bc6fd96221252f50ebb8b49774ccfd2a72e6b53e9a412582b0b37f585608e1b73e68f5d916e66b77247b130b4fc58bf49f5bf7a06e39b6931c5f7dac93ab

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\FileSyncConfig.exe

                                                                                                                                                        Filesize

                                                                                                                                                        553KB

                                                                                                                                                        MD5

                                                                                                                                                        57bd9bd545af2b0f2ce14a33ca57ece9

                                                                                                                                                        SHA1

                                                                                                                                                        15b4b5afff9abba2de64cbd4f0989f1b2fbc4bf1

                                                                                                                                                        SHA256

                                                                                                                                                        a3a4b648e4dcf3a4e5f7d13cc3d21b0353e496da75f83246cc8a15fada463bdf

                                                                                                                                                        SHA512

                                                                                                                                                        d134f9881312ddbd0d61f39fd62af5443a4947d3de010fef3b0f6ebf17829bd4c2f13f6299d2a7aad35c868bb451ef6991c5093c2809e6be791f05f137324b39

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\FileSyncSessions.dll

                                                                                                                                                        Filesize

                                                                                                                                                        3.7MB

                                                                                                                                                        MD5

                                                                                                                                                        ae97076d64cdc42a9249c9de5f2f8d76

                                                                                                                                                        SHA1

                                                                                                                                                        75218c3016f76e6542c61d21fe6b372237c64f4d

                                                                                                                                                        SHA256

                                                                                                                                                        1e0c26ceecee602b5b4a25fb9b0433c26bac05bd1eee4a43b9aa75ae46ccf115

                                                                                                                                                        SHA512

                                                                                                                                                        0668f6d5d1d012ec608341f83e67ce857d68b4ea9cfa9b3956d4fc5c61f8a6acd2c2622977c2737b936a735f55fdcce46477034f55e5a71e5ef4d115ee09bfec

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\FileSyncTelemetryExtensions.dll

                                                                                                                                                        Filesize

                                                                                                                                                        58KB

                                                                                                                                                        MD5

                                                                                                                                                        51b6038293549c2858b4395ca5c0376e

                                                                                                                                                        SHA1

                                                                                                                                                        93bf452a6a750b52653812201a909c6bc1f19fa3

                                                                                                                                                        SHA256

                                                                                                                                                        a742c9e35d824b592b3d9daf15efb3d4a28b420533ddf35a1669a5b77a00bb75

                                                                                                                                                        SHA512

                                                                                                                                                        b8cfdab124ee424b1b099ff73d0a6c6f4fd0bf56c8715f7f26dbe39628a2453cd63d5e346dbf901fcbfb951dfbd726b288466ff32297498e63dea53289388c0c

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\FileSyncViews.dll

                                                                                                                                                        Filesize

                                                                                                                                                        2.4MB

                                                                                                                                                        MD5

                                                                                                                                                        8e9ef192850f858f60dd0cc588bbb691

                                                                                                                                                        SHA1

                                                                                                                                                        80d5372e58abfe0d06ea225f48281351411b997c

                                                                                                                                                        SHA256

                                                                                                                                                        146740eddcb439b1222d545b4d32a1a905641d02b14e1da61832772ce32e76ba

                                                                                                                                                        SHA512

                                                                                                                                                        793ad58741e8b9203c845cbacc1af11fb17b1c610d307e0698c6f3c2e8d41c0d13ceb063c7a61617e5b59403edc5e831ababb091e283fb06262add24d154bf58

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogUploader.dll

                                                                                                                                                        Filesize

                                                                                                                                                        769KB

                                                                                                                                                        MD5

                                                                                                                                                        03f13c5ec1922f3a0ec641ad4df4a261

                                                                                                                                                        SHA1

                                                                                                                                                        b23c1c6f23e401dc09bfbf6ce009ce4281216d7e

                                                                                                                                                        SHA256

                                                                                                                                                        fe49f22bb132fedf1412e99169d307fa715dbdd84fe71c3e3ff12300d30d4987

                                                                                                                                                        SHA512

                                                                                                                                                        b47dbd9fad9467f72d4d0d5ca9df508247176f9e11b537c750837e8b3782a2d20f31fad361153d816ddf7f5e8109a614f3c6e4e2307af69cd3e2506cc0515d81

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LoggingPlatform.dll

                                                                                                                                                        Filesize

                                                                                                                                                        504KB

                                                                                                                                                        MD5

                                                                                                                                                        4ffef06099812f4f86d1280d69151a3f

                                                                                                                                                        SHA1

                                                                                                                                                        e5da93b4e0cf14300701a0efbd7caf80b86621c3

                                                                                                                                                        SHA256

                                                                                                                                                        d5a538a0a036c602492f9b2b6f85de59924da9ec3ed7a7bbf6ecd0979bee54d3

                                                                                                                                                        SHA512

                                                                                                                                                        d667fd0ae46039914f988eb7e407344114944a040468e4ec5a53d562db2c3241737566308d8420bb4f7c89c6ef446a7881b83eaac7daba3271b81754c5c0f34a

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-black_scale-100.png

                                                                                                                                                        Filesize

                                                                                                                                                        1KB

                                                                                                                                                        MD5

                                                                                                                                                        72747c27b2f2a08700ece584c576af89

                                                                                                                                                        SHA1

                                                                                                                                                        5301ca4813cd5ff2f8457635bc3c8944c1fb9f33

                                                                                                                                                        SHA256

                                                                                                                                                        6f028542f6faeaaf1f564eab2605bedb20a2ee72cdd9930bde1a3539344d721b

                                                                                                                                                        SHA512

                                                                                                                                                        3e7f84d3483a25a52a036bf7fd87aac74ac5af327bb8e4695e39dada60c4d6607d1c04e7769a808be260db2af6e91b789008d276ccc6b7e13c80eb97e2818aba

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-black_scale-125.png

                                                                                                                                                        Filesize

                                                                                                                                                        1KB

                                                                                                                                                        MD5

                                                                                                                                                        b83ac69831fd735d5f3811cc214c7c43

                                                                                                                                                        SHA1

                                                                                                                                                        5b549067fdd64dcb425b88fabe1b1ca46a9a8124

                                                                                                                                                        SHA256

                                                                                                                                                        cbdcf248f8a0fcd583b475562a7cdcb58f8d01236c7d06e4cdbfe28e08b2a185

                                                                                                                                                        SHA512

                                                                                                                                                        4b2ee6b3987c048ab7cc827879b38fb3c216dab8e794239d189d1ba71122a74fdaa90336e2ea33abd06ba04f37ded967eb98fd742a02463b6eb68ab917155600

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-black_scale-150.png

                                                                                                                                                        Filesize

                                                                                                                                                        2KB

                                                                                                                                                        MD5

                                                                                                                                                        771bc7583fe704745a763cd3f46d75d2

                                                                                                                                                        SHA1

                                                                                                                                                        e38f9d7466eefc6d3d2aaa327f1bd42c5a5c7752

                                                                                                                                                        SHA256

                                                                                                                                                        36a6aad9a9947ab3f6ac6af900192f5a55870d798bca70c46770ccf2108fd62d

                                                                                                                                                        SHA512

                                                                                                                                                        959ea603abec708895b7f4ef0639c3f2d270cfdd38d77ac9bab8289918cbd4dbac3c36c11bb52c6f01b0adae597b647bb784bba513d77875979270f4962b7884

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-black_scale-200.png

                                                                                                                                                        Filesize

                                                                                                                                                        2KB

                                                                                                                                                        MD5

                                                                                                                                                        09773d7bb374aeec469367708fcfe442

                                                                                                                                                        SHA1

                                                                                                                                                        2bfb6905321c0c1fd35e1b1161d2a7663e5203d6

                                                                                                                                                        SHA256

                                                                                                                                                        67d1bb54fcb19c174de1936d08b5dbdb31b98cfdd280bcc5122fb0693675e4f2

                                                                                                                                                        SHA512

                                                                                                                                                        f500ea4a87a24437b60b0dc3ec69fcc5edbc39c2967743ddb41093b824d0845ffddd2df420a12e17e4594df39f63adad5abb69a29f8456fed03045a6b42388bc

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-black_scale-400.png

                                                                                                                                                        Filesize

                                                                                                                                                        6KB

                                                                                                                                                        MD5

                                                                                                                                                        e01cdbbd97eebc41c63a280f65db28e9

                                                                                                                                                        SHA1

                                                                                                                                                        1c2657880dd1ea10caf86bd08312cd832a967be1

                                                                                                                                                        SHA256

                                                                                                                                                        5cb8fd670585de8a7fc0ceede164847522d287ef17cd48806831ea18a0ceac1f

                                                                                                                                                        SHA512

                                                                                                                                                        ffd928e289dc0e36fa406f0416fb07c2eb0f3725a9cdbb27225439d75b8582d68705ec508e3c4af1fc4982d06d70ef868cafbfc73a637724dee7f34828d14850

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-white_scale-100.png

                                                                                                                                                        Filesize

                                                                                                                                                        2KB

                                                                                                                                                        MD5

                                                                                                                                                        19876b66df75a2c358c37be528f76991

                                                                                                                                                        SHA1

                                                                                                                                                        181cab3db89f416f343bae9699bf868920240c8b

                                                                                                                                                        SHA256

                                                                                                                                                        a024fc5dbe0973fd9267229da4ebfd8fc41d73ca27a2055715aafe0efb4f3425

                                                                                                                                                        SHA512

                                                                                                                                                        78610a040bbbb026a165a5a50dfbaf4208ebef7407660eea1a20e95c30d0d42ef1d13f647802a2f0638443ae2253c49945ebe018c3499ddbf00cfdb1db42ced1

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-white_scale-125.png

                                                                                                                                                        Filesize

                                                                                                                                                        3KB

                                                                                                                                                        MD5

                                                                                                                                                        8347d6f79f819fcf91e0c9d3791d6861

                                                                                                                                                        SHA1

                                                                                                                                                        5591cf408f0adaa3b86a5a30b0112863ec3d6d28

                                                                                                                                                        SHA256

                                                                                                                                                        e8b30bfcee8041f1a70e61ca46764416fd1df2e6086ba4c280bfa2220c226750

                                                                                                                                                        SHA512

                                                                                                                                                        9f658bc77131f4ac4f730ed56a44a406e09a3ceec215b7a0b2ed42d019d8b13d89ab117affb547a5107b5a84feb330329dc15e14644f2b52122acb063f2ba550

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-white_scale-150.png

                                                                                                                                                        Filesize

                                                                                                                                                        3KB

                                                                                                                                                        MD5

                                                                                                                                                        de5ba8348a73164c66750f70f4b59663

                                                                                                                                                        SHA1

                                                                                                                                                        1d7a04b74bd36ecac2f5dae6921465fc27812fec

                                                                                                                                                        SHA256

                                                                                                                                                        a0bbe33b798c3adac36396e877908874cffaadb240244095c68dff840dcbbf73

                                                                                                                                                        SHA512

                                                                                                                                                        85197e0b13a1ae48f51660525557cceaeed7d893dd081939f62e6e8921bb036c6501d3bb41250649048a286ff6bac6c9c1a426d2f58f3e3b41521db26ef6a17c

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-white_scale-200.png

                                                                                                                                                        Filesize

                                                                                                                                                        4KB

                                                                                                                                                        MD5

                                                                                                                                                        f1c75409c9a1b823e846cc746903e12c

                                                                                                                                                        SHA1

                                                                                                                                                        f0e1f0cf35369544d88d8a2785570f55f6024779

                                                                                                                                                        SHA256

                                                                                                                                                        fba9104432cbb8ebbd45c18ef1ba46a45dd374773e5aa37d411bb023ded8efd6

                                                                                                                                                        SHA512

                                                                                                                                                        ed72eb547e0c03776f32e07191ce7022d08d4bcc66e7abca4772cdd8c22d8e7a423577805a4925c5e804ed6c15395f3df8aac7af62f1129e4982685d7e46bd85

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.contrast-white_scale-400.png

                                                                                                                                                        Filesize

                                                                                                                                                        8KB

                                                                                                                                                        MD5

                                                                                                                                                        adbbeb01272c8d8b14977481108400d6

                                                                                                                                                        SHA1

                                                                                                                                                        1cc6868eec36764b249de193f0ce44787ba9dd45

                                                                                                                                                        SHA256

                                                                                                                                                        9250ef25efc2a9765cf1126524256fdfc963c8687edfdc4a2ecde50d748ada85

                                                                                                                                                        SHA512

                                                                                                                                                        c15951cf2dc076ed508665cd7dac2251c8966c1550b78549b926e98c01899ad825535001bd65eeb2f8680cd6753cd47e95606ecf453919f5827ed12bca062887

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.scale-100.png

                                                                                                                                                        Filesize

                                                                                                                                                        2KB

                                                                                                                                                        MD5

                                                                                                                                                        57a6876000151c4303f99e9a05ab4265

                                                                                                                                                        SHA1

                                                                                                                                                        1a63d3dd2b8bdc0061660d4add5a5b9af0ff0794

                                                                                                                                                        SHA256

                                                                                                                                                        8acbdd41252595b7410ca2ed438d6d8ede10bd17fe3a18705eedc65f46e4c1c4

                                                                                                                                                        SHA512

                                                                                                                                                        c6a2a9124bc6bcf70d2977aaca7e3060380a4d9428a624cc6e5624c75ebb6d6993c6186651d4e54edf32f3491d413714ef97a4cdc42bae94045cd804f0ad7cba

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.scale-125.png

                                                                                                                                                        Filesize

                                                                                                                                                        4KB

                                                                                                                                                        MD5

                                                                                                                                                        d03b7edafe4cb7889418f28af439c9c1

                                                                                                                                                        SHA1

                                                                                                                                                        16822a2ab6a15dda520f28472f6eeddb27f81178

                                                                                                                                                        SHA256

                                                                                                                                                        a5294e3c7cd855815f8d916849d87bd2357f5165eb4372f248fdf8b988601665

                                                                                                                                                        SHA512

                                                                                                                                                        59d99f0b9a7813b28bae3ea1ae5bdbbf0d87d32ff621ff20cbe1b900c52bb480c722dd428578dea5d5351cc36f1fa56b2c1712f2724344f026fe534232812962

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.scale-150.png

                                                                                                                                                        Filesize

                                                                                                                                                        5KB

                                                                                                                                                        MD5

                                                                                                                                                        a23c55ae34e1b8d81aa34514ea792540

                                                                                                                                                        SHA1

                                                                                                                                                        3b539dfb299d00b93525144fd2afd7dd9ba4ccbf

                                                                                                                                                        SHA256

                                                                                                                                                        3df4590386671e0d6fee7108e457eb805370a189f5fdfeaf2f2c32d5adc76abd

                                                                                                                                                        SHA512

                                                                                                                                                        1423a2534ae71174f34ee527fe3a0db38480a869cac50b08b60a2140b5587b3944967a95016f0b00e3ca9ced1f1452c613bb76c34d7ebd386290667084bce77d

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.scale-200.png

                                                                                                                                                        Filesize

                                                                                                                                                        6KB

                                                                                                                                                        MD5

                                                                                                                                                        13e6baac125114e87f50c21017b9e010

                                                                                                                                                        SHA1

                                                                                                                                                        561c84f767537d71c901a23a061213cf03b27a58

                                                                                                                                                        SHA256

                                                                                                                                                        3384357b6110f418b175e2f0910cffe588c847c8e55f2fe3572d82999a62c18e

                                                                                                                                                        SHA512

                                                                                                                                                        673c3bec7c2cd99c07ebfca0f4ab14cd6341086c8702fe9e8b5028aed0174398d7c8a94583da40c32cd0934d784062ad6db71f49391f64122459f8bb00222e08

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveMedTile.scale-400.png

                                                                                                                                                        Filesize

                                                                                                                                                        15KB

                                                                                                                                                        MD5

                                                                                                                                                        e593676ee86a6183082112df974a4706

                                                                                                                                                        SHA1

                                                                                                                                                        c4e91440312dea1f89777c2856cb11e45d95fe55

                                                                                                                                                        SHA256

                                                                                                                                                        deb0ec0ee8f1c4f7ea4de2c28ff85087ee5ff8c7e3036c3b0a66d84bae32b6bb

                                                                                                                                                        SHA512

                                                                                                                                                        11d7ed45f461f44fa566449bb50bcfce35f73fc775744c2d45ea80aeb364fe40a68a731a2152f10edc059dea16b8bab9c9a47da0c9ffe3d954f57da0ff714681

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.contrast-black_scale-100.png

                                                                                                                                                        Filesize

                                                                                                                                                        783B

                                                                                                                                                        MD5

                                                                                                                                                        f4e9f958ed6436aef6d16ee6868fa657

                                                                                                                                                        SHA1

                                                                                                                                                        b14bc7aaca388f29570825010ebc17ca577b292f

                                                                                                                                                        SHA256

                                                                                                                                                        292cac291af7b45f12404f968759afc7145b2189e778b14d681449132b14f06b

                                                                                                                                                        SHA512

                                                                                                                                                        cd5d78317e82127e9a62366fd33d5420a6f25d0a6e55552335e64dc39932238abd707fe75d4f62472bc28a388d32b70ff08b6aa366c092a7ace3367896a2bd98

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.contrast-black_scale-125.png

                                                                                                                                                        Filesize

                                                                                                                                                        1018B

                                                                                                                                                        MD5

                                                                                                                                                        2c7a9e323a69409f4b13b1c3244074c4

                                                                                                                                                        SHA1

                                                                                                                                                        3c77c1b013691fa3bdff5677c3a31b355d3e2205

                                                                                                                                                        SHA256

                                                                                                                                                        8efeacefb92d64dfb1c4df2568165df6436777f176accfd24f4f7970605d16c2

                                                                                                                                                        SHA512

                                                                                                                                                        087c12e225c1d791d7ad0bf7d3544b4bed8c4fb0daaa02aee0e379badae8954fe6120d61fdf1a11007cbcdb238b5a02c54f429b6cc692a145aa8fbd220c0cb2d

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.contrast-black_scale-150.png

                                                                                                                                                        Filesize

                                                                                                                                                        1KB

                                                                                                                                                        MD5

                                                                                                                                                        552b0304f2e25a1283709ad56c4b1a85

                                                                                                                                                        SHA1

                                                                                                                                                        92a9d0d795852ec45beae1d08f8327d02de8994e

                                                                                                                                                        SHA256

                                                                                                                                                        262b9a30bb8db4fc59b5bc348aa3813c75e113066a087135d0946ad916f72535

                                                                                                                                                        SHA512

                                                                                                                                                        9559895b66ef533486f43274f7346ad3059c15f735c9ce5351adf1403c95c2b787372153d4827b03b6eb530f75efcf9ae89db1e9c69189e86d6383138ab9c839

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.contrast-black_scale-200.png

                                                                                                                                                        Filesize

                                                                                                                                                        1KB

                                                                                                                                                        MD5

                                                                                                                                                        22e17842b11cd1cb17b24aa743a74e67

                                                                                                                                                        SHA1

                                                                                                                                                        f230cb9e5a6cb027e6561fabf11a909aa3ba0207

                                                                                                                                                        SHA256

                                                                                                                                                        9833b80def72b73fca150af17d4b98c8cd484401f0e2d44320ecd75b5bb57c42

                                                                                                                                                        SHA512

                                                                                                                                                        8332fc72cd411f9d9fd65950d58bf6440563dc4bd5ce3622775306575802e20c967f0ee6bab2092769a11e2a4ea228dab91a02534beeb8afde8239dd2b90f23a

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.contrast-black_scale-400.png

                                                                                                                                                        Filesize

                                                                                                                                                        3KB

                                                                                                                                                        MD5

                                                                                                                                                        3c29933ab3beda6803c4b704fba48c53

                                                                                                                                                        SHA1

                                                                                                                                                        056fe7770a2ba171a54bd60b3c29c4fbb6d42f0c

                                                                                                                                                        SHA256

                                                                                                                                                        3a7ef7c0bda402fdaff19a479d6c18577c436a5f4e188da4c058a42ef09a7633

                                                                                                                                                        SHA512

                                                                                                                                                        09408a000a6fa8046649c61ccef36afa1046869506f019f739f67f5c1c05d2e313b95a60bd43d9be882688df1610ad7979dd9d1f16a2170959b526ebd89b8ef7

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.scale-100.png

                                                                                                                                                        Filesize

                                                                                                                                                        1KB

                                                                                                                                                        MD5

                                                                                                                                                        1f156044d43913efd88cad6aa6474d73

                                                                                                                                                        SHA1

                                                                                                                                                        1f6bd3e15a4bdb052746cf9840bdc13e7e8eda26

                                                                                                                                                        SHA256

                                                                                                                                                        4e11167708801727891e8dd9257152b7391fc483d46688d61f44b96360f76816

                                                                                                                                                        SHA512

                                                                                                                                                        df791d7c1e7a580e589613b5a56ba529005162d3564fffd4c8514e6afaa5eccea9cea9e1ac43bd9d74ee3971b2e94d985b103176db592e3c775d5feec7aac6d1

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.scale-125.png

                                                                                                                                                        Filesize

                                                                                                                                                        2KB

                                                                                                                                                        MD5

                                                                                                                                                        09f3f8485e79f57f0a34abd5a67898ca

                                                                                                                                                        SHA1

                                                                                                                                                        e68ae5685d5442c1b7acc567dc0b1939cad5f41a

                                                                                                                                                        SHA256

                                                                                                                                                        69e432d1eec44bed4aad35f72a912e1f0036a4b501a50aec401c9fa260a523e3

                                                                                                                                                        SHA512

                                                                                                                                                        0eafeaf735cedc322719049db6325ccbf5e92de229cace927b78a08317e842261b7adbda03ec192f71ee36e35eb9bf9624589de01beaec2c5597a605fc224130

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.scale-150.png

                                                                                                                                                        Filesize

                                                                                                                                                        3KB

                                                                                                                                                        MD5

                                                                                                                                                        ed306d8b1c42995188866a80d6b761de

                                                                                                                                                        SHA1

                                                                                                                                                        eadc119bec9fad65019909e8229584cd6b7e0a2b

                                                                                                                                                        SHA256

                                                                                                                                                        7e3f35d5eb05435be8d104a2eacf5bace8301853104a4ea4768601c607ddf301

                                                                                                                                                        SHA512

                                                                                                                                                        972a42f7677d57fcb8c8cb0720b21a6ffe9303ea58dde276cfe2f26ee68fe4cc8ae6d29f3a21a400253de7c0a212edf29981e9e2bca49750b79dd439461c8335

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.scale-200.png

                                                                                                                                                        Filesize

                                                                                                                                                        4KB

                                                                                                                                                        MD5

                                                                                                                                                        d9d00ecb4bb933cdbb0cd1b5d511dcf5

                                                                                                                                                        SHA1

                                                                                                                                                        4e41b1eda56c4ebe5534eb49e826289ebff99dd9

                                                                                                                                                        SHA256

                                                                                                                                                        85823f7a5a4ebf8274f790a88b981e92ede57bde0ba804f00b03416ee4feda89

                                                                                                                                                        SHA512

                                                                                                                                                        8b53dec59bba8b4033e5c6b2ff77f9ba6b929c412000184928978f13b475cd691a854fee7d55026e48eab8ac84cf34fc7cb38e3766bbf743cf07c4d59afb98f4

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\LogoImages\OneDriveSmallTile.scale-400.png

                                                                                                                                                        Filesize

                                                                                                                                                        11KB

                                                                                                                                                        MD5

                                                                                                                                                        096d0e769212718b8de5237b3427aacc

                                                                                                                                                        SHA1

                                                                                                                                                        4b912a0f2192f44824057832d9bb08c1a2c76e72

                                                                                                                                                        SHA256

                                                                                                                                                        9a0b901e97abe02036c782eb6a2471e18160b89fd5141a5a9909f0baab67b1ef

                                                                                                                                                        SHA512

                                                                                                                                                        99eb3d67e1a05ffa440e70b7e053b7d32e84326671b0b9d2fcfcea2633b8566155477b2a226521bf860b471c5926f8e1f8e3a52676cacb41b40e2b97cb3c1173

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\OneDrive.VisualElementsManifest.xml

                                                                                                                                                        Filesize

                                                                                                                                                        344B

                                                                                                                                                        MD5

                                                                                                                                                        5ae2d05d894d1a55d9a1e4f593c68969

                                                                                                                                                        SHA1

                                                                                                                                                        a983584f58d68552e639601538af960a34fa1da7

                                                                                                                                                        SHA256

                                                                                                                                                        d21077ad0c29a4c939b8c25f1186e2b542d054bb787b1d3210e9cab48ec3080c

                                                                                                                                                        SHA512

                                                                                                                                                        152949f5b661980f33608a0804dd8c43d70e056ae0336e409006e764664496fef6e60daa09fecb8d74523d3e7928c0dbd5d8272d8be1cf276852d88370954adc

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\OneDrive.exe

                                                                                                                                                        Filesize

                                                                                                                                                        2.3MB

                                                                                                                                                        MD5

                                                                                                                                                        c2938eb5ff932c2540a1514cc82c197c

                                                                                                                                                        SHA1

                                                                                                                                                        2d7da1c3bfa4755ba0efec5317260d239cbb51c3

                                                                                                                                                        SHA256

                                                                                                                                                        5d8273bf98397e4c5053f8f154e5f838c7e8a798b125fcad33cab16e2515b665

                                                                                                                                                        SHA512

                                                                                                                                                        5deb54462615e39cf7871418871856094031a383e9ad82d5a5993f1e67b7ade7c2217055b657c0d127189792c3bcf6c1fcfbd3c5606f6134adfafcccfa176441

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\OneDriveStandaloneUpdater.exe

                                                                                                                                                        Filesize

                                                                                                                                                        2.9MB

                                                                                                                                                        MD5

                                                                                                                                                        9cdabfbf75fd35e615c9f85fedafce8a

                                                                                                                                                        SHA1

                                                                                                                                                        57b7fc9bf59cf09a9c19ad0ce0a159746554d682

                                                                                                                                                        SHA256

                                                                                                                                                        969fbb03015dd9f33baf45f2750e36b77003a7e18c3954fab890cddc94046673

                                                                                                                                                        SHA512

                                                                                                                                                        348923f497e615a5cd0ed428eb1e30a792dea310585645b721235d48f3f890398ad51d8955c1e483df0a712ba2c0a18ad99b977be64f5ee6768f955b12a4a236

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\OneDriveTelemetryStable.dll

                                                                                                                                                        Filesize

                                                                                                                                                        1.6MB

                                                                                                                                                        MD5

                                                                                                                                                        6e8ae346e8e0e35c32b6fa7ae1fc48c3

                                                                                                                                                        SHA1

                                                                                                                                                        ca0668ddb59e5aa98d9a90eceba90a0ee2fb7869

                                                                                                                                                        SHA256

                                                                                                                                                        146811735589450058048408f05644a93786a293c09ccb8d74420fb87c0a4d56

                                                                                                                                                        SHA512

                                                                                                                                                        aa65ef969b1868a54d78a4f697e6edbded31b118f053bbe8a19a599baaf63821dc05f75b2ac87452cb414ab6572b8d9b349093931e64601c47f8ebbb49c431cd

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\Qt5Core.dll

                                                                                                                                                        Filesize

                                                                                                                                                        5.1MB

                                                                                                                                                        MD5

                                                                                                                                                        3f7e824274680aa09589d590285132a5

                                                                                                                                                        SHA1

                                                                                                                                                        9105067dbd726ab9798e9eec61ce49366b586376

                                                                                                                                                        SHA256

                                                                                                                                                        ad44dbb30520d85f055595f0bc734b16b9f2fb659f17198310c0557b55a76d70

                                                                                                                                                        SHA512

                                                                                                                                                        cc467c92eec097dc40072d044dfb7a50e427c38d789c642e01886ea724033cab9f2035404b4a500d58f1d102381fe995e7b214c823019d51ef243af3b86a8339

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\Qt5Gui.dll

                                                                                                                                                        Filesize

                                                                                                                                                        5.3MB

                                                                                                                                                        MD5

                                                                                                                                                        d059f2c0c4e09b319479190485e917da

                                                                                                                                                        SHA1

                                                                                                                                                        cba292c199c035f5cd036f72481360ed01ee552a

                                                                                                                                                        SHA256

                                                                                                                                                        bcfe906135d759cca8c2c7e32679c85404a288d99f3d4da13d929e98f6e607d5

                                                                                                                                                        SHA512

                                                                                                                                                        20d11522da194c0e3ce95ddf2fa1a6770824451e99a0dbf5ff56d3a71d72acf8e930066be0593fd793b38e27a3b24ae91fdfbe8910f0bd60b8e3b85a1e8942cd

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\Qt5Qml.dll

                                                                                                                                                        Filesize

                                                                                                                                                        2.7MB

                                                                                                                                                        MD5

                                                                                                                                                        1e5f98f97212fdba3f96adc40493b082

                                                                                                                                                        SHA1

                                                                                                                                                        23f4fd2d8c07a476fcb765e9d6011ece57b71569

                                                                                                                                                        SHA256

                                                                                                                                                        bdadc298fda94a9ad1268128863276c7f898bef3ae79a3e6782cecf22f1294a2

                                                                                                                                                        SHA512

                                                                                                                                                        86c5654f1ca26d5d153b27d942f505382bbb7a84f2acb3475d1577f60dba8bfec0b27860b847c3a6ff6acf8fcb54a71f775411f8245df5cb068175373dfa9c53

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\Qt5Quick.dll

                                                                                                                                                        Filesize

                                                                                                                                                        3.3MB

                                                                                                                                                        MD5

                                                                                                                                                        042baef2aae45acfd4d6018cbf95728c

                                                                                                                                                        SHA1

                                                                                                                                                        055e62d259641815ee3037221b096093d3ae85f1

                                                                                                                                                        SHA256

                                                                                                                                                        c0d9b9ecb002635f24dcaf53eb34f46c22bacf02afae768f2d0834656a5d581d

                                                                                                                                                        SHA512

                                                                                                                                                        e434acd6c227f049fbbbe0ec5652327d0b9b4633e8867f902e098ca20c6a39176d7bad77ca9d9866949e411b7a27d4eb359566bfe949c325b4bcf5cf155cf2e2

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\Resources.pri

                                                                                                                                                        Filesize

                                                                                                                                                        4KB

                                                                                                                                                        MD5

                                                                                                                                                        7473be9c7899f2a2da99d09c596b2d6d

                                                                                                                                                        SHA1

                                                                                                                                                        0f76063651fe45bbc0b5c0532ad87d7dc7dc53ac

                                                                                                                                                        SHA256

                                                                                                                                                        e1252527bc066da6838344d49660e4c6ff2d1ddfda036c5ec19b07fdfb90c8c3

                                                                                                                                                        SHA512

                                                                                                                                                        a4a5c97856e314eedbad38411f250d139a668c2256d917788697c8a009d5408d559772e0836713853704e6a3755601ae7ee433e07a34bd0e7f130a3e28729c45

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\SyncEngine.dll

                                                                                                                                                        Filesize

                                                                                                                                                        8.3MB

                                                                                                                                                        MD5

                                                                                                                                                        0e57c5bc0d93729f40e8bea5f3be6349

                                                                                                                                                        SHA1

                                                                                                                                                        7895bfd4d7ddced3c731bdc210fb25f0f7c6e27e

                                                                                                                                                        SHA256

                                                                                                                                                        51b13dd5d598367fe202681dce761544ee3f7ec4f36d0c7c3c8a3fca32582f07

                                                                                                                                                        SHA512

                                                                                                                                                        1e64aaa7eaad0b2ea109b459455b745de913308f345f3356eabe427f8010db17338806f024de3f326b89bc6fd805f2c6a184e5bae7b76a8dcb9efac77ed4b95b

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\Telemetry.dll

                                                                                                                                                        Filesize

                                                                                                                                                        451KB

                                                                                                                                                        MD5

                                                                                                                                                        50ea1cd5e09e3e2002fadb02d67d8ce6

                                                                                                                                                        SHA1

                                                                                                                                                        c4515f089a4615d920971b28833ec739e3c329f3

                                                                                                                                                        SHA256

                                                                                                                                                        414f6f64d463b3eb1e9eb21d9455837c99c7d9097f6bb61bd12c71e8dce62902

                                                                                                                                                        SHA512

                                                                                                                                                        440ededc1389b253f3a31c4f188fda419daf2f58096cf73cad3e72a746bdcde6bde049ce74c1eb521909d700d50fbfddbf802ead190cd54927ea03b5d0ce81b3

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\UpdateRingSettings.dll

                                                                                                                                                        Filesize

                                                                                                                                                        432KB

                                                                                                                                                        MD5

                                                                                                                                                        037df27be847ef8ab259be13e98cdd59

                                                                                                                                                        SHA1

                                                                                                                                                        d5541dfa2454a5d05c835ec5303c84628f48e7b2

                                                                                                                                                        SHA256

                                                                                                                                                        9fb3abcafd8e8b1deb13ec0f46c87b759a1cb610b2488052ba70e3363f1935ec

                                                                                                                                                        SHA512

                                                                                                                                                        7e1a04368ec469e4059172c5b44fd08d4ea3d01df98bfd6d4cc91ac45f381862ecf89fe9c6bedce985a12158d840cd6cfa06ce9d22466fbf6110140465002205

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\WebView2Loader.dll

                                                                                                                                                        Filesize

                                                                                                                                                        107KB

                                                                                                                                                        MD5

                                                                                                                                                        925531f12a2f4a687598e7a4643d2faa

                                                                                                                                                        SHA1

                                                                                                                                                        26ca3ee178a50d23a09754adf362e02739bc1c39

                                                                                                                                                        SHA256

                                                                                                                                                        41a13ba97534c7f321f3f29ef1650bd445bd3490153a2bb2d57e0fbc70d339c1

                                                                                                                                                        SHA512

                                                                                                                                                        221934308658f0270e8a6ed89c9b164efb3516b2cc877216adb3fbd1dd5b793a3189afe1f6e2a7ef4b6106e988210eeb325b6aa78685e68964202e049516c984

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\adal.dll

                                                                                                                                                        Filesize

                                                                                                                                                        1.3MB

                                                                                                                                                        MD5

                                                                                                                                                        fe837e65648bf84a3b19c08bbc79351f

                                                                                                                                                        SHA1

                                                                                                                                                        b1ad96bcb627565dd02d823b1df3316bba3dac42

                                                                                                                                                        SHA256

                                                                                                                                                        55234df27deb004b09c18dc15ca46327e48b26b36dfb43a92741f86300bd8e9e

                                                                                                                                                        SHA512

                                                                                                                                                        64ce9573485341439a1d80d1bdc76b44d63c79fb7ec3de6fb084a86183c13c383ec63516407d82fbc86854568c717764efdec26eaf1f4ed05cdb9f974804d263

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\msvcp140.dll

                                                                                                                                                        Filesize

                                                                                                                                                        425KB

                                                                                                                                                        MD5

                                                                                                                                                        ce8a66d40621f89c5a639691db3b96b4

                                                                                                                                                        SHA1

                                                                                                                                                        b5f26f17ddd08e1ba73c57635c20c56aaa46b435

                                                                                                                                                        SHA256

                                                                                                                                                        545bb4a00b29b4b5d25e16e1d0969e99b4011033ce3d1d7e827abef09dd317e7

                                                                                                                                                        SHA512

                                                                                                                                                        85fc18e75e4c7f26a2c83578356b1947e12ec002510a574da86ad62114f1640128e58a6858603189317c77059c71ac0824f10b6117fa1c83af76ee480d36b671

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\ucrtbase.dll

                                                                                                                                                        Filesize

                                                                                                                                                        1.1MB

                                                                                                                                                        MD5

                                                                                                                                                        7a333d415adead06a1e1ce5f9b2d5877

                                                                                                                                                        SHA1

                                                                                                                                                        9bd49c3b960b707eb5fc3ed4db1e2041062c59c7

                                                                                                                                                        SHA256

                                                                                                                                                        5ade748445d8da8f22d46ad46f277e1e160f6e946fc51e5ac51b9401ce5daf46

                                                                                                                                                        SHA512

                                                                                                                                                        d388cb0d3acc7f1792eadfba519b37161a466a8c1eb95b342464adc71f311165a7f3e938c7f6a251e10f37c9306881ea036742438191226fb9309167786fa59a

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\21.220.1024.0005\vcruntime140.dll

                                                                                                                                                        Filesize

                                                                                                                                                        73KB

                                                                                                                                                        MD5

                                                                                                                                                        cefcd5d1f068c4265c3976a4621543d4

                                                                                                                                                        SHA1

                                                                                                                                                        4d874d6d6fa19e0476a229917c01e7c1dd5ceacd

                                                                                                                                                        SHA256

                                                                                                                                                        c79241aec5e35cba91563c3b33ed413ce42309f5145f25dc92caf9c82a753817

                                                                                                                                                        SHA512

                                                                                                                                                        d934c43f1bd47c5900457642b3cbdcd43643115cd3e78b244f3a28fee5eea373e65b6e1cb764e356839090ce4a7a85d74f2b7631c48741d88cf44c9703114ec9

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\Update\OneDriveSetup.exe

                                                                                                                                                        Filesize

                                                                                                                                                        40.2MB

                                                                                                                                                        MD5

                                                                                                                                                        fb4aa59c92c9b3263eb07e07b91568b5

                                                                                                                                                        SHA1

                                                                                                                                                        6071a3e3c4338b90d892a8416b6a92fbfe25bb67

                                                                                                                                                        SHA256

                                                                                                                                                        e70e80dbbc9baba7ddcee70eda1bb8d0e6612dfb1d93827fe7b594a59f3b48b9

                                                                                                                                                        SHA512

                                                                                                                                                        60aabbe2fd24c04c33e7892eab64f24f8c335a0dd9822eb01adc5459e850769fc200078c5ccee96c1f2013173bc41f5a2023def3f5fe36e380963db034924ace

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\settings\Personal\logUploaderSettings_temp.ini

                                                                                                                                                        Filesize

                                                                                                                                                        38B

                                                                                                                                                        MD5

                                                                                                                                                        cc04d6015cd4395c9b980b280254156e

                                                                                                                                                        SHA1

                                                                                                                                                        87b176f1330dc08d4ffabe3f7e77da4121c8e749

                                                                                                                                                        SHA256

                                                                                                                                                        884d272d16605590e511ae50c88842a8ce203a864f56061a3c554f8f8265866e

                                                                                                                                                        SHA512

                                                                                                                                                        d3cb7853b69649c673814d5738247b5fbaaae5bb7b84e4c7b3ff5c4f1b1a85fc7261a35f0282d79076a9c862e5e1021d31a318d8b2e5a74b80500cb222642940

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\settings\Personal\logUploaderSettings_temp.ini

                                                                                                                                                        Filesize

                                                                                                                                                        108B

                                                                                                                                                        MD5

                                                                                                                                                        13513ea7d5fe12d3c762c8e6d6adfd08

                                                                                                                                                        SHA1

                                                                                                                                                        d45a6c5acbf4572da913cfe8896a1a6771c8f97d

                                                                                                                                                        SHA256

                                                                                                                                                        44f7b7938dbc0225df484e6d581dfe1d4be3dc296c9a0cfba1a955c3e5cb2523

                                                                                                                                                        SHA512

                                                                                                                                                        0d2405a0e32404b70f777167a839c4d20dde326fbff7b8a32bd4eee189b0c1c37ccf00b0a6681c0dfc6dabb89794d2b0b531a63b5173eb6b0e3c76606377aac7

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\settings\PreSignInSettingsConfig.json

                                                                                                                                                        Filesize

                                                                                                                                                        63KB

                                                                                                                                                        MD5

                                                                                                                                                        e516a60bc980095e8d156b1a99ab5eee

                                                                                                                                                        SHA1

                                                                                                                                                        238e243ffc12d4e012fd020c9822703109b987f6

                                                                                                                                                        SHA256

                                                                                                                                                        543796a1b343b4ebc0285d89cb8eb70667ac7b513da37495e38003704e9d88d7

                                                                                                                                                        SHA512

                                                                                                                                                        9b51e99ba20e9da56d1acc24a1cf9f9c9dbdeb742bec034e0ff2bc179a60f4aff249f40344f9ddd43229dcdefa1041940f65afb336d46c175ffeff725c638d58

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\OneDrive\setup\logs\DeviceHealthSummaryConfiguration.ini

                                                                                                                                                        Filesize

                                                                                                                                                        77B

                                                                                                                                                        MD5

                                                                                                                                                        e2b0be51ab460b63f43591df03ee9c61

                                                                                                                                                        SHA1

                                                                                                                                                        22b6aaa4734f416ff4ccc454188391b9d4849816

                                                                                                                                                        SHA256

                                                                                                                                                        b81e3a49877eb6c7408cd91f92e7f98b2ef27958e9573808c135f485be8895ba

                                                                                                                                                        SHA512

                                                                                                                                                        341d9de0ce6b2ee63bde3152e1e2f9ed7003576974b8f6e556dcdc02b7e6c807146e4db6181aefda884d7180eb84f0feec2d75621601dbe9696972bb9c291cc2

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\JEEKKVVQ\update100[1].xml

                                                                                                                                                        Filesize

                                                                                                                                                        726B

                                                                                                                                                        MD5

                                                                                                                                                        53244e542ddf6d280a2b03e28f0646b7

                                                                                                                                                        SHA1

                                                                                                                                                        d9925f810a95880c92974549deead18d56f19c37

                                                                                                                                                        SHA256

                                                                                                                                                        36a6bd38a8a6f5a75b73caffae5ae66dfabcaefd83da65b493fa881ea8a64e7d

                                                                                                                                                        SHA512

                                                                                                                                                        4aa71d92ea2c46df86565d97aac75395371d3e17877ab252a297b84dca2ab251d50aaffc62eab9961f0df48de6f12be04a1f4a2cbde75b9ae7bcce6eb5450c62

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\cfcc9481-e9d2-4d33-85d4-ec755321bbf5.down_data

                                                                                                                                                        Filesize

                                                                                                                                                        555KB

                                                                                                                                                        MD5

                                                                                                                                                        5683c0028832cae4ef93ca39c8ac5029

                                                                                                                                                        SHA1

                                                                                                                                                        248755e4e1db552e0b6f8651b04ca6d1b31a86fb

                                                                                                                                                        SHA256

                                                                                                                                                        855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e

                                                                                                                                                        SHA512

                                                                                                                                                        aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\ToMwIYMg.bat

                                                                                                                                                        Filesize

                                                                                                                                                        112B

                                                                                                                                                        MD5

                                                                                                                                                        bae1095f340720d965898063fede1273

                                                                                                                                                        SHA1

                                                                                                                                                        455d8a81818a7e82b1490c949b32fa7ff98d5210

                                                                                                                                                        SHA256

                                                                                                                                                        ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a

                                                                                                                                                        SHA512

                                                                                                                                                        4e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\aria-debug-4696.log

                                                                                                                                                        Filesize

                                                                                                                                                        470B

                                                                                                                                                        MD5

                                                                                                                                                        160bdc81c2b7822c84106b1fea921bf8

                                                                                                                                                        SHA1

                                                                                                                                                        fe524a2ba70337fb42de2066e0ad05c5ce483fba

                                                                                                                                                        SHA256

                                                                                                                                                        e50d1e738a854bbe30588ae5c1fd8c55aa4919db5a3d2e4ec2c404d609370540

                                                                                                                                                        SHA512

                                                                                                                                                        46c7db83f0a91fe08a6036ae36180e79813d7e68bd7262753697eeece74247e9dcecc3ad864360f587e11960a1372ef2377cd4d28f1c0ca9a5380088e54282aa

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\file.vbs

                                                                                                                                                        Filesize

                                                                                                                                                        19B

                                                                                                                                                        MD5

                                                                                                                                                        4afb5c4527091738faf9cd4addf9d34e

                                                                                                                                                        SHA1

                                                                                                                                                        170ba9d866894c1b109b62649b1893eb90350459

                                                                                                                                                        SHA256

                                                                                                                                                        59d889a2bf392f4b117340832b4c73425a7fb1de6c2f83a1aaa779d477c7c6cc

                                                                                                                                                        SHA512

                                                                                                                                                        16d386d9ece30b459fd47ca87da1f67b38d52a8e55f8fd063762cb3b46ae2c10bc6eac7359b0d1ef4c31c1ac8748ae8f62f8816eff0691abdd3304df38e979a5

                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\tmpAD14.tmp

                                                                                                                                                        Filesize

                                                                                                                                                        35.9MB

                                                                                                                                                        MD5

                                                                                                                                                        5b16ef80abd2b4ace517c4e98f4ff551

                                                                                                                                                        SHA1

                                                                                                                                                        438806a0256e075239aa8bbec9ba3d3fb634af55

                                                                                                                                                        SHA256

                                                                                                                                                        bbc70091b3834af5413b9658b07269badd4cae8d96724bf1f7919f6aab595009

                                                                                                                                                        SHA512

                                                                                                                                                        69a22b063ab92ca7e941b826400c62be41ae0317143387c8aa8c727b5c9ee3528ddd4014de22a2a2e2cbae801cb041fe477d68d2684353cdf6c83d7ee97c43d4

                                                                                                                                                      • C:\Users\Admin\Downloads\PolyRansom

                                                                                                                                                        Filesize

                                                                                                                                                        25KB

                                                                                                                                                        MD5

                                                                                                                                                        2fc0e096bf2f094cca883de93802abb6

                                                                                                                                                        SHA1

                                                                                                                                                        a4b51b3b4c645a8c082440a6abbc641c5d4ec986

                                                                                                                                                        SHA256

                                                                                                                                                        14695f6259685d72bf20db399b419153031fa35277727ab9b2259bf44a8f8ae3

                                                                                                                                                        SHA512

                                                                                                                                                        7418892efe2f3c2ff245c0b84708922a9374324116a525fa16f7c4bca03b267db123ad7757acf8e0ba15d4ea623908d6a14424088a542125c7a6394970dd8978

                                                                                                                                                      • C:\Users\Admin\Downloads\PolyRansom.exe:Zone.Identifier

                                                                                                                                                        Filesize

                                                                                                                                                        55B

                                                                                                                                                        MD5

                                                                                                                                                        0f98a5550abe0fb880568b1480c96a1c

                                                                                                                                                        SHA1

                                                                                                                                                        d2ce9f7057b201d31f79f3aee2225d89f36be07d

                                                                                                                                                        SHA256

                                                                                                                                                        2dfb5f4b33e4cf8237b732c02b1f2b1192ffe4b83114bcf821f489bbf48c6aa1

                                                                                                                                                        SHA512

                                                                                                                                                        dbc1150d831950684ab37407defac0177b7583da0fe13ee8f8eeb65e8b05d23b357722246888189b4681b97507a4262ece96a1c458c4427a9a41d8ea8d11a2f6

                                                                                                                                                      • C:\Users\Admin\Downloads\Unconfirmed 260686.crdownload

                                                                                                                                                        Filesize

                                                                                                                                                        220KB

                                                                                                                                                        MD5

                                                                                                                                                        3ed3fb296a477156bc51aba43d825fc0

                                                                                                                                                        SHA1

                                                                                                                                                        9caa5c658b1a88fee149893d3a00b34a8bb8a1a6

                                                                                                                                                        SHA256

                                                                                                                                                        1898f2cae1e3824cb0f7fd5368171a33aba179e63501e480b4da9ea05ebf0423

                                                                                                                                                        SHA512

                                                                                                                                                        dc3d6e409cee4d54f48d1a25912243d07e2f800578c8e0e348ce515a047ecf5fa3089b46284e0956bbced345957a000eecdc082e6f3060971759d70a14c1c97e

                                                                                                                                                      • C:\Users\Admin\Downloads\Unconfirmed 744020.crdownload

                                                                                                                                                        Filesize

                                                                                                                                                        321KB

                                                                                                                                                        MD5

                                                                                                                                                        600e0dbaefc03f7bf50abb0def3fb465

                                                                                                                                                        SHA1

                                                                                                                                                        1b5f0ac48e06edc4ed8243be61d71077f770f2b4

                                                                                                                                                        SHA256

                                                                                                                                                        61e6a93f43049712b5f2d949fd233fa8015fe4bef01b9e1285d3d87b12f894f2

                                                                                                                                                        SHA512

                                                                                                                                                        151eebac8f8f6e72d130114f030f048dff5bce0f99ff8d3a22e8fed7616155b3e87d29acf79f488d6b53ed2c5c9b05b57f76f1f91a568c21fe9bca228efb23d9

                                                                                                                                                      • memory/392-1568-0x0000000000400000-0x0000000000439000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        228KB

                                                                                                                                                      • memory/392-1556-0x0000000000400000-0x0000000000439000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        228KB

                                                                                                                                                      • memory/908-1688-0x0000000000400000-0x0000000000439000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        228KB

                                                                                                                                                      • memory/1224-1627-0x0000000000400000-0x0000000000439000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        228KB

                                                                                                                                                      • memory/1312-1584-0x0000000000400000-0x0000000000439000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        228KB

                                                                                                                                                      • memory/1556-1532-0x0000000000400000-0x0000000000439000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        228KB

                                                                                                                                                      • memory/1556-1557-0x0000000000400000-0x0000000000439000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        228KB

                                                                                                                                                      • memory/2332-1708-0x0000000000400000-0x0000000000439000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        228KB

                                                                                                                                                      • memory/2412-1377-0x0000000000400000-0x0000000000553000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        1.3MB

                                                                                                                                                      • memory/2412-1378-0x0000000000400000-0x0000000000553000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        1.3MB

                                                                                                                                                      • memory/2548-1733-0x0000000000400000-0x0000000000439000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        228KB

                                                                                                                                                      • memory/2920-1637-0x0000000000400000-0x0000000000439000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        228KB

                                                                                                                                                      • memory/3320-1671-0x0000000000400000-0x0000000000439000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        228KB

                                                                                                                                                      • memory/3320-1662-0x0000000000400000-0x0000000000439000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        228KB

                                                                                                                                                      • memory/3832-1592-0x0000000000400000-0x0000000000439000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        228KB

                                                                                                                                                      • memory/4696-1576-0x0000000000400000-0x0000000000439000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        228KB

                                                                                                                                                      • memory/4696-1564-0x0000000000400000-0x0000000000439000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        228KB

                                                                                                                                                      • memory/4824-1679-0x0000000000400000-0x0000000000439000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        228KB

                                                                                                                                                      • memory/4956-1552-0x0000000000400000-0x0000000000433000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        204KB

                                                                                                                                                      • memory/5144-1547-0x0000000000400000-0x0000000000432000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        200KB

                                                                                                                                                      • memory/5176-1652-0x0000000000400000-0x0000000000439000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        228KB

                                                                                                                                                      • memory/5176-1660-0x0000000000400000-0x0000000000439000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        228KB

                                                                                                                                                      • memory/5236-1687-0x0000000000400000-0x0000000000439000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        228KB

                                                                                                                                                      • memory/5236-1696-0x0000000000400000-0x0000000000439000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        228KB

                                                                                                                                                      • memory/5448-1651-0x0000000000400000-0x0000000000439000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        228KB

                                                                                                                                                      • memory/5784-1359-0x0000000005160000-0x00000000051F2000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        584KB

                                                                                                                                                      • memory/5784-1366-0x0000000005510000-0x0000000005538000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        160KB

                                                                                                                                                      • memory/5784-1365-0x0000000005BE0000-0x0000000005C7C000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        624KB

                                                                                                                                                      • memory/5784-1363-0x0000000005140000-0x0000000005148000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        32KB

                                                                                                                                                      • memory/5784-1357-0x0000000005630000-0x0000000005BD6000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        5.6MB

                                                                                                                                                      • memory/5784-1354-0x00000000002B0000-0x0000000000306000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        344KB

                                                                                                                                                      • memory/5852-1602-0x0000000000400000-0x0000000000439000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        228KB

                                                                                                                                                      • memory/5952-1619-0x0000000000400000-0x0000000000439000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        228KB

                                                                                                                                                      • memory/6004-1725-0x0000000000400000-0x0000000000439000-memory.dmp

                                                                                                                                                        Filesize

                                                                                                                                                        228KB