Analysis

  • max time kernel
    77s
  • max time network
    89s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/03/2025, 01:00

General

  • Target

    https://cdn.discordapp.com/attachments/1348223092425625616/1353366241263222934/Fusion_Fornite.rar?ex=67e6aa08&is=67e55888&hm=010d8dd5421c59a9e595c445246c696e63f1f36592d0cc45a406d43f909a6f42&

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 15 IoCs

    Using powershell.exe command.

  • Uses browser remote debugging 2 TTPs 7 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Clipboard Data 1 TTPs 2 IoCs

    Adversaries may collect data stored in the clipboard from users copying information within or between applications.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 12 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Blocklisted process makes network request 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 9 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 3 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 52 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cdn.discordapp.com/attachments/1348223092425625616/1353366241263222934/Fusion_Fornite.rar?ex=67e6aa08&is=67e55888&hm=010d8dd5421c59a9e595c445246c696e63f1f36592d0cc45a406d43f909a6f42&
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:5652
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fffcf3edcf8,0x7fffcf3edd04,0x7fffcf3edd10
      2⤵
        PID:3008
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2144,i,12784553647341887109,13870852688047271744,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2132 /prefetch:2
        2⤵
          PID:5532
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1560,i,12784553647341887109,13870852688047271744,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2160 /prefetch:3
          2⤵
            PID:5776
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2204,i,12784553647341887109,13870852688047271744,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2368 /prefetch:8
            2⤵
              PID:2212
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3136,i,12784553647341887109,13870852688047271744,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3176 /prefetch:1
              2⤵
                PID:5548
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3144,i,12784553647341887109,13870852688047271744,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3212 /prefetch:1
                2⤵
                  PID:4564
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4400,i,12784553647341887109,13870852688047271744,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4408 /prefetch:2
                  2⤵
                    PID:4976
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5348,i,12784553647341887109,13870852688047271744,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5460 /prefetch:8
                    2⤵
                      PID:3156
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=4784,i,12784553647341887109,13870852688047271744,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5992 /prefetch:8
                      2⤵
                        PID:988
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=6008,i,12784553647341887109,13870852688047271744,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=6016 /prefetch:8
                        2⤵
                          PID:2260
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=6088,i,12784553647341887109,13870852688047271744,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=5916 /prefetch:8
                          2⤵
                            PID:6048
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=6032,i,12784553647341887109,13870852688047271744,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=6040 /prefetch:8
                            2⤵
                              PID:4300
                          • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                            "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                            1⤵
                              PID:2168
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                              1⤵
                                PID:1724
                              • C:\Windows\system32\OpenWith.exe
                                C:\Windows\system32\OpenWith.exe -Embedding
                                1⤵
                                • Modifies registry class
                                • Suspicious use of SetWindowsHookEx
                                PID:5952
                              • C:\Windows\system32\OpenWith.exe
                                C:\Windows\system32\OpenWith.exe -Embedding
                                1⤵
                                • Modifies registry class
                                • Suspicious use of SetWindowsHookEx
                                PID:5976
                              • C:\Windows\System32\rundll32.exe
                                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                1⤵
                                  PID:5716
                                • C:\Program Files\7-Zip\7zG.exe
                                  "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Fusion Fornite\" -ad -an -ai#7zMap13499:90:7zEvent31587
                                  1⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  • Suspicious use of FindShellTrayWindow
                                  PID:2716
                                • C:\Windows\System32\msiexec.exe
                                  "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\Downloads\Fusion Fornite\FusionFornite.msi"
                                  1⤵
                                  • Blocklisted process makes network request
                                  • Enumerates connected drives
                                  • Suspicious use of FindShellTrayWindow
                                  PID:1764
                                • C:\Windows\system32\msiexec.exe
                                  C:\Windows\system32\msiexec.exe /V
                                  1⤵
                                  • Enumerates connected drives
                                  • Drops file in Windows directory
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:5888
                                  • C:\Windows\system32\srtasks.exe
                                    C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
                                    2⤵
                                      PID:2164
                                    • C:\Users\Admin\AppData\Local\Programs\piastra\Stellarconquest.exe
                                      "C:\Users\Admin\AppData\Local\Programs\piastra\Stellarconquest.exe"
                                      2⤵
                                      • Checks computer location settings
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:4920
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /d /s /c "chcp"
                                        3⤵
                                          PID:4136
                                          • C:\Windows\system32\chcp.com
                                            chcp
                                            4⤵
                                              PID:540
                                          • C:\Users\Admin\AppData\Local\Programs\piastra\Stellarconquest.exe
                                            "C:\Users\Admin\AppData\Local\Programs\piastra\Stellarconquest.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\piastra" --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=1872 --field-trial-handle=1876,i,8905892830007782360,17946874554513921767,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
                                            3⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            PID:3812
                                          • C:\Users\Admin\AppData\Local\Programs\piastra\Stellarconquest.exe
                                            "C:\Users\Admin\AppData\Local\Programs\piastra\Stellarconquest.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\piastra" --mojo-platform-channel-handle=2064 --field-trial-handle=1876,i,8905892830007782360,17946874554513921767,262144 --disable-features=SpareRendererForSitePerProcess,WinDelaySpellcheckServiceInit,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
                                            3⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            PID:388
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /d /s /c "wmic process where processid=4920 get ExecutablePath"
                                            3⤵
                                              PID:2112
                                              • C:\Windows\System32\Wbem\WMIC.exe
                                                wmic process where processid=4920 get ExecutablePath
                                                4⤵
                                                  PID:5220
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /d /s /c "NET SESSION"
                                                3⤵
                                                  PID:1436
                                                  • C:\Windows\system32\net.exe
                                                    NET SESSION
                                                    4⤵
                                                      PID:4328
                                                      • C:\Windows\system32\net1.exe
                                                        C:\Windows\system32\net1 SESSION
                                                        5⤵
                                                          PID:3700
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Cryptography" /v MachineGuid"
                                                      3⤵
                                                        PID:2880
                                                        • C:\Windows\system32\reg.exe
                                                          C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Cryptography" /v MachineGuid
                                                          4⤵
                                                            PID:6108
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /d /s /c "echo %COMPUTERNAME%.%USERDNSDOMAIN%"
                                                          3⤵
                                                            PID:4484
                                                          • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                            C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                                                            3⤵
                                                            • Command and Scripting Interpreter: PowerShell
                                                            PID:3956
                                                          • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                            C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                                                            3⤵
                                                            • Command and Scripting Interpreter: PowerShell
                                                            PID:1220
                                                          • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                            C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                                                            3⤵
                                                            • Command and Scripting Interpreter: PowerShell
                                                            PID:1456
                                                          • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                            C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                                                            3⤵
                                                            • Command and Scripting Interpreter: PowerShell
                                                            PID:4448
                                                          • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                            C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                                                            3⤵
                                                            • Command and Scripting Interpreter: PowerShell
                                                            PID:5204
                                                          • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                            C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                                                            3⤵
                                                            • Command and Scripting Interpreter: PowerShell
                                                            PID:5148
                                                          • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                            C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                                                            3⤵
                                                            • Command and Scripting Interpreter: PowerShell
                                                            PID:3828
                                                          • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                            C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                                                            3⤵
                                                            • Command and Scripting Interpreter: PowerShell
                                                            PID:6124
                                                          • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                            C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                                                            3⤵
                                                            • Command and Scripting Interpreter: PowerShell
                                                            PID:2452
                                                          • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                            C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                                                            3⤵
                                                            • Command and Scripting Interpreter: PowerShell
                                                            PID:1292
                                                          • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                            C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                                                            3⤵
                                                            • Command and Scripting Interpreter: PowerShell
                                                            PID:4204
                                                          • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                            C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                                                            3⤵
                                                            • Command and Scripting Interpreter: PowerShell
                                                            PID:5872
                                                          • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                            C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
                                                            3⤵
                                                            • Command and Scripting Interpreter: PowerShell
                                                            PID:3220
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\system32\cmd.exe /d /s /c "findstr /C:"Detected boot environment" "%windir%\Panther\setupact.log""
                                                            3⤵
                                                              PID:6276
                                                              • C:\Windows\system32\findstr.exe
                                                                findstr /C:"Detected boot environment" "C:\Windows\Panther\setupact.log"
                                                                4⤵
                                                                  PID:5320
                                                              • C:\Windows\system32\cmd.exe
                                                                C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall""
                                                                3⤵
                                                                  PID:2436
                                                                  • C:\Windows\system32\reg.exe
                                                                    C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall"
                                                                    4⤵
                                                                      PID:2224
                                                                  • C:\Windows\system32\cmd.exe
                                                                    C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall""
                                                                    3⤵
                                                                      PID:1812
                                                                      • C:\Windows\system32\reg.exe
                                                                        C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall"
                                                                        4⤵
                                                                          PID:6916
                                                                      • C:\Windows\system32\cmd.exe
                                                                        C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\7-Zip""
                                                                        3⤵
                                                                          PID:6932
                                                                          • C:\Windows\system32\reg.exe
                                                                            C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\7-Zip"
                                                                            4⤵
                                                                              PID:5688
                                                                          • C:\Windows\system32\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AddressBook""
                                                                            3⤵
                                                                              PID:6728
                                                                              • C:\Windows\system32\reg.exe
                                                                                C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\AddressBook"
                                                                                4⤵
                                                                                  PID:6968
                                                                              • C:\Windows\system32\cmd.exe
                                                                                C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Connection Manager""
                                                                                3⤵
                                                                                  PID:5520
                                                                                  • C:\Windows\system32\reg.exe
                                                                                    C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Connection Manager"
                                                                                    4⤵
                                                                                      PID:864
                                                                                  • C:\Windows\system32\cmd.exe
                                                                                    C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DirectDrawEx""
                                                                                    3⤵
                                                                                      PID:6960
                                                                                      • C:\Windows\system32\reg.exe
                                                                                        C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DirectDrawEx"
                                                                                        4⤵
                                                                                          PID:2352
                                                                                      • C:\Windows\system32\cmd.exe
                                                                                        C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DXM_Runtime""
                                                                                        3⤵
                                                                                          PID:6964
                                                                                          • C:\Windows\system32\reg.exe
                                                                                            C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\DXM_Runtime"
                                                                                            4⤵
                                                                                              PID:6308
                                                                                          • C:\Windows\system32\cmd.exe
                                                                                            C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Fontcore""
                                                                                            3⤵
                                                                                              PID:6648
                                                                                              • C:\Windows\system32\reg.exe
                                                                                                C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Fontcore"
                                                                                                4⤵
                                                                                                  PID:732
                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE40""
                                                                                                3⤵
                                                                                                  PID:1464
                                                                                                  • C:\Windows\system32\reg.exe
                                                                                                    C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE40"
                                                                                                    4⤵
                                                                                                      PID:4112
                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                    C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE4Data""
                                                                                                    3⤵
                                                                                                      PID:6584
                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                        C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE4Data"
                                                                                                        4⤵
                                                                                                          PID:1764
                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                        C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE5BAKEX""
                                                                                                        3⤵
                                                                                                          PID:7148
                                                                                                          • C:\Windows\system32\reg.exe
                                                                                                            C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IE5BAKEX"
                                                                                                            4⤵
                                                                                                              PID:6084
                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                            C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IEData""
                                                                                                            3⤵
                                                                                                              PID:6740
                                                                                                              • C:\Windows\system32\reg.exe
                                                                                                                C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\IEData"
                                                                                                                4⤵
                                                                                                                  PID:5300
                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MobileOptionPack""
                                                                                                                3⤵
                                                                                                                  PID:2924
                                                                                                                  • C:\Windows\system32\reg.exe
                                                                                                                    C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MobileOptionPack"
                                                                                                                    4⤵
                                                                                                                      PID:5012
                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                    C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Mozilla Firefox 135.0 (x64 en-US)""
                                                                                                                    3⤵
                                                                                                                      PID:6708
                                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                                        C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Mozilla Firefox 135.0 (x64 en-US)"
                                                                                                                        4⤵
                                                                                                                          PID:2204
                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                        C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MozillaMaintenanceService""
                                                                                                                        3⤵
                                                                                                                          PID:6912
                                                                                                                          • C:\Windows\system32\reg.exe
                                                                                                                            C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MozillaMaintenanceService"
                                                                                                                            4⤵
                                                                                                                              PID:4388
                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                            C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MPlayer2""
                                                                                                                            3⤵
                                                                                                                              PID:6420
                                                                                                                              • C:\Windows\system32\reg.exe
                                                                                                                                C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\MPlayer2"
                                                                                                                                4⤵
                                                                                                                                  PID:4028
                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ProPlusRetail - en-us""
                                                                                                                                3⤵
                                                                                                                                  PID:1996
                                                                                                                                  • C:\Windows\system32\reg.exe
                                                                                                                                    C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ProPlusRetail - en-us"
                                                                                                                                    4⤵
                                                                                                                                      PID:1976
                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                    C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SchedulingAgent""
                                                                                                                                    3⤵
                                                                                                                                      PID:3460
                                                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                                                        C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\SchedulingAgent"
                                                                                                                                        4⤵
                                                                                                                                          PID:6672
                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                        C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\VLC media player""
                                                                                                                                        3⤵
                                                                                                                                          PID:1804
                                                                                                                                          • C:\Windows\system32\reg.exe
                                                                                                                                            C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\VLC media player"
                                                                                                                                            4⤵
                                                                                                                                              PID:1224
                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                            C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\WIC""
                                                                                                                                            3⤵
                                                                                                                                              PID:1064
                                                                                                                                              • C:\Windows\system32\reg.exe
                                                                                                                                                C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\WIC"
                                                                                                                                                4⤵
                                                                                                                                                  PID:3616
                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{01B2627D-8443-41C0-97F0-9F72AC2FD6A0}""
                                                                                                                                                3⤵
                                                                                                                                                  PID:6156
                                                                                                                                                  • C:\Windows\system32\reg.exe
                                                                                                                                                    C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{01B2627D-8443-41C0-97F0-9F72AC2FD6A0}"
                                                                                                                                                    4⤵
                                                                                                                                                      PID:3568
                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                    C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1B690A4C-381A-40D4-BA4A-3F8ACD5CE797}""
                                                                                                                                                    3⤵
                                                                                                                                                      PID:4836
                                                                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                                                                        C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1B690A4C-381A-40D4-BA4A-3F8ACD5CE797}"
                                                                                                                                                        4⤵
                                                                                                                                                          PID:4528
                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                        C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}""
                                                                                                                                                        3⤵
                                                                                                                                                          PID:4636
                                                                                                                                                          • C:\Windows\system32\reg.exe
                                                                                                                                                            C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{1D8E6291-B0D5-35EC-8441-6616F567A0F7}"
                                                                                                                                                            4⤵
                                                                                                                                                              PID:6204
                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                            C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{2BB73336-4F69-4141-9797-E9BD6FE3980A}""
                                                                                                                                                            3⤵
                                                                                                                                                              PID:3552
                                                                                                                                                              • C:\Windows\system32\reg.exe
                                                                                                                                                                C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{2BB73336-4F69-4141-9797-E9BD6FE3980A}"
                                                                                                                                                                4⤵
                                                                                                                                                                  PID:5700
                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{37B8F9C7-03FB-3253-8781-2517C99D7C00}""
                                                                                                                                                                3⤵
                                                                                                                                                                  PID:4140
                                                                                                                                                                  • C:\Windows\system32\reg.exe
                                                                                                                                                                    C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{37B8F9C7-03FB-3253-8781-2517C99D7C00}"
                                                                                                                                                                    4⤵
                                                                                                                                                                      PID:6488
                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                    C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{3A96B93E-763F-41E7-85C7-1F3CCC37EF27}""
                                                                                                                                                                    3⤵
                                                                                                                                                                      PID:6800
                                                                                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                                                                                        C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{3A96B93E-763F-41E7-85C7-1F3CCC37EF27}"
                                                                                                                                                                        4⤵
                                                                                                                                                                          PID:7016
                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                        C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{5740BD44-B58D-321A-AFC0-6D3D4556DD6C}""
                                                                                                                                                                        3⤵
                                                                                                                                                                          PID:4048
                                                                                                                                                                          • C:\Windows\system32\reg.exe
                                                                                                                                                                            C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{5740BD44-B58D-321A-AFC0-6D3D4556DD6C}"
                                                                                                                                                                            4⤵
                                                                                                                                                                              PID:6352
                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                            C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{5FCE6D76-F5DC-37AB-B2B8-22AB8CEDB1D4}""
                                                                                                                                                                            3⤵
                                                                                                                                                                              PID:3220
                                                                                                                                                                              • C:\Windows\system32\reg.exe
                                                                                                                                                                                C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{5FCE6D76-F5DC-37AB-B2B8-22AB8CEDB1D4}"
                                                                                                                                                                                4⤵
                                                                                                                                                                                  PID:2232
                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{64A3A4F4-B792-11D6-A78A-00B0D0180381}""
                                                                                                                                                                                3⤵
                                                                                                                                                                                  PID:4592
                                                                                                                                                                                  • C:\Windows\system32\reg.exe
                                                                                                                                                                                    C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{64A3A4F4-B792-11D6-A78A-00B0D0180381}"
                                                                                                                                                                                    4⤵
                                                                                                                                                                                      PID:4492
                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                    C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{662A0088-6FCD-45DD-9EA7-68674058AED5}""
                                                                                                                                                                                    3⤵
                                                                                                                                                                                      PID:4620
                                                                                                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                                                                                                        C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{662A0088-6FCD-45DD-9EA7-68674058AED5}"
                                                                                                                                                                                        4⤵
                                                                                                                                                                                          PID:4440
                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                        C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6BC4FBE5-4625-422E-922E-C863AF6C82F9}""
                                                                                                                                                                                        3⤵
                                                                                                                                                                                          PID:3916
                                                                                                                                                                                          • C:\Windows\system32\reg.exe
                                                                                                                                                                                            C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6BC4FBE5-4625-422E-922E-C863AF6C82F9}"
                                                                                                                                                                                            4⤵
                                                                                                                                                                                              PID:4876
                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                            C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6DB765A8-05AF-49A1-A71D-6F645EE3CE41}""
                                                                                                                                                                                            3⤵
                                                                                                                                                                                              PID:4764
                                                                                                                                                                                              • C:\Windows\system32\reg.exe
                                                                                                                                                                                                C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6DB765A8-05AF-49A1-A71D-6F645EE3CE41}"
                                                                                                                                                                                                4⤵
                                                                                                                                                                                                  PID:4852
                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{7447A794-FA2E-42BE-BA9A-5FCBD54C5DF3}""
                                                                                                                                                                                                3⤵
                                                                                                                                                                                                  PID:4864
                                                                                                                                                                                                  • C:\Windows\system32\reg.exe
                                                                                                                                                                                                    C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{7447A794-FA2E-42BE-BA9A-5FCBD54C5DF3}"
                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                      PID:5548
                                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{77924AE4-039E-4CA4-87B4-2F64180381F0}""
                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                      PID:6536
                                                                                                                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                                                                                                                        C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{77924AE4-039E-4CA4-87B4-2F64180381F0}"
                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                          PID:6592
                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{79043ED0-7ED1-4227-A5E5-04C5594D21F7}""
                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                          PID:6988
                                                                                                                                                                                                          • C:\Windows\system32\reg.exe
                                                                                                                                                                                                            C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{79043ED0-7ED1-4227-A5E5-04C5594D21F7}"
                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                              PID:6516
                                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                            C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90160000-007E-0000-1000-0000000FF1CE}""
                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                              PID:4160
                                                                                                                                                                                                              • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                  PID:2224
                                                                                                                                                                                                                • C:\Windows\system32\reg.exe
                                                                                                                                                                                                                  C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90160000-007E-0000-1000-0000000FF1CE}"
                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                    PID:4272
                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90160000-008C-0000-1000-0000000FF1CE}""
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                    PID:6904
                                                                                                                                                                                                                    • C:\Windows\system32\reg.exe
                                                                                                                                                                                                                      C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90160000-008C-0000-1000-0000000FF1CE}"
                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                        PID:2112
                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90160000-008C-0409-1000-0000000FF1CE}""
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                        PID:6428
                                                                                                                                                                                                                        • C:\Windows\system32\reg.exe
                                                                                                                                                                                                                          C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{90160000-008C-0409-1000-0000000FF1CE}"
                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                            PID:2744
                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{9F51D16B-42E8-4A4A-8228-75045541A2AE}""
                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                            PID:1432
                                                                                                                                                                                                                            • C:\Windows\system32\reg.exe
                                                                                                                                                                                                                              C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{9F51D16B-42E8-4A4A-8228-75045541A2AE}"
                                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                                PID:5348
                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{BCC2FB07-8CF0-4542-B10C-61BCEF04AFF2}""
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                PID:5900
                                                                                                                                                                                                                                • C:\Windows\system32\reg.exe
                                                                                                                                                                                                                                  C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{BCC2FB07-8CF0-4542-B10C-61BCEF04AFF2}"
                                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                                    PID:6656
                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{C7B73281-AB0A-4DAD-A09F-5C30D40679AC}""
                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                    PID:536
                                                                                                                                                                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                                        PID:2352
                                                                                                                                                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                                                                                                                                                        C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{C7B73281-AB0A-4DAD-A09F-5C30D40679AC}"
                                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                                          PID:4516
                                                                                                                                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                        C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{CB0836EC-B072-368D-82B2-D3470BF95707}""
                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                          PID:6956
                                                                                                                                                                                                                                          • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                                                              PID:6308
                                                                                                                                                                                                                                            • C:\Windows\system32\reg.exe
                                                                                                                                                                                                                                              C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{CB0836EC-B072-368D-82B2-D3470BF95707}"
                                                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                                                PID:5252
                                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{CE4D7AE0-FCBA-486F-A58F-DBA3626FBE4B}""
                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                PID:6984
                                                                                                                                                                                                                                                • C:\Windows\system32\reg.exe
                                                                                                                                                                                                                                                  C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{CE4D7AE0-FCBA-486F-A58F-DBA3626FBE4B}"
                                                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                                                    PID:1788
                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{CF2BEA3C-26EA-32F8-AA9B-331F7E34BA97}""
                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                    PID:5720
                                                                                                                                                                                                                                                    • C:\Windows\system32\reg.exe
                                                                                                                                                                                                                                                      C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{CF2BEA3C-26EA-32F8-AA9B-331F7E34BA97}"
                                                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                                                        PID:5448
                                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D46F1FD9-2FE8-4D05-B2AC-011C23B69B24}""
                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                        PID:4280
                                                                                                                                                                                                                                                        • C:\Windows\system32\reg.exe
                                                                                                                                                                                                                                                          C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{D46F1FD9-2FE8-4D05-B2AC-011C23B69B24}"
                                                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                                                            PID:2196
                                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E634F316-BEB6-4FB3-A612-F7102F576165}""
                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                            PID:2748
                                                                                                                                                                                                                                                            • C:\Windows\system32\reg.exe
                                                                                                                                                                                                                                                              C:\Windows\system32\reg.exe QUERY "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{E634F316-BEB6-4FB3-A612-F7102F576165}"
                                                                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                                                                PID:2452
                                                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /d /s /c "powershell -ExecutionPolicy Bypass -NoProfile -File "C:\Users\Admin\AppData\Local\Temp\XP7w0oheltJo_tezmp.ps1""
                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                PID:3068
                                                                                                                                                                                                                                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                  powershell -ExecutionPolicy Bypass -NoProfile -File "C:\Users\Admin\AppData\Local\Temp\XP7w0oheltJo_tezmp.ps1"
                                                                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                                                                  PID:5372
                                                                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /d /s /c "tasklist /FO CSV /NH"
                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                  PID:4944
                                                                                                                                                                                                                                                                  • C:\Windows\system32\tasklist.exe
                                                                                                                                                                                                                                                                    tasklist /FO CSV /NH
                                                                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                                                                    • Enumerates processes with tasklist
                                                                                                                                                                                                                                                                    PID:4600
                                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /d /s /c "mullvad account get"
                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                    PID:6680
                                                                                                                                                                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /d /s /c "powershell -Command "Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct | Format-List displayName, instanceGuid, pathToSignedProductExe, pathToSignedReportingExe, productState, timestamp""
                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                      PID:6684
                                                                                                                                                                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                        powershell -Command "Get-CimInstance -Namespace root/SecurityCenter2 -ClassName AntiVirusProduct | Format-List displayName, instanceGuid, pathToSignedProductExe, pathToSignedReportingExe, productState, timestamp"
                                                                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                                                                        PID:2812
                                                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /d /s /c "powershell Get-Clipboard"
                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                      • Clipboard Data
                                                                                                                                                                                                                                                                      PID:6164
                                                                                                                                                                                                                                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                                                        powershell Get-Clipboard
                                                                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                                                                        • Clipboard Data
                                                                                                                                                                                                                                                                        PID:540
                                                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /d /s /c "netsh wlan show profile"
                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                      • System Network Configuration Discovery: Wi-Fi Discovery
                                                                                                                                                                                                                                                                      PID:3460
                                                                                                                                                                                                                                                                      • C:\Windows\system32\netsh.exe
                                                                                                                                                                                                                                                                        netsh wlan show profile
                                                                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                                                                        • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                                                                                                                                                        • System Network Configuration Discovery: Wi-Fi Discovery
                                                                                                                                                                                                                                                                        PID:4372
                                                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /d /s /c "C:\Windows\system32\reg.exe QUERY "HKCU\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions""
                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                        PID:6528
                                                                                                                                                                                                                                                                        • C:\Windows\system32\reg.exe
                                                                                                                                                                                                                                                                          C:\Windows\system32\reg.exe QUERY "HKCU\SOFTWARE\Martin Prikryl\WinSCP 2\Sessions"
                                                                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                                                                            PID:3956
                                                                                                                                                                                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                                          "C:/Program Files/Google/Chrome/Application/chrome.exe" --remote-debugging-port=9222 --profile-directory=Default --window-position=-2400,-2400
                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                          • Uses browser remote debugging
                                                                                                                                                                                                                                                                          PID:6180
                                                                                                                                                                                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fffb79adcf8,0x7fffb79add04,0x7fffb79add10
                                                                                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                                                                                              PID:6352
                                                                                                                                                                                                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1560,i,15732198869567396589,7735831612249302008,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2164 /prefetch:3
                                                                                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                                                                                PID:5532
                                                                                                                                                                                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2136,i,15732198869567396589,7735831612249302008,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2132 /prefetch:2
                                                                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                                                                  PID:4620
                                                                                                                                                                                                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2364,i,15732198869567396589,7735831612249302008,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=2340 /prefetch:8
                                                                                                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                                                                                                    PID:3104
                                                                                                                                                                                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3240,i,15732198869567396589,7735831612249302008,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3312 /prefetch:1
                                                                                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                                                                                    • Uses browser remote debugging
                                                                                                                                                                                                                                                                                    PID:4756
                                                                                                                                                                                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3248,i,15732198869567396589,7735831612249302008,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=3332 /prefetch:1
                                                                                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                                                                                    • Uses browser remote debugging
                                                                                                                                                                                                                                                                                    PID:4764
                                                                                                                                                                                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                                                                                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9222 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3532,i,15732198869567396589,7735831612249302008,262144 --variations-seed-version=20250313-182214.581000 --mojo-platform-channel-handle=4404 /prefetch:1
                                                                                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                                                                                    • Uses browser remote debugging
                                                                                                                                                                                                                                                                                    PID:960
                                                                                                                                                                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                                                                                                  "C:/Program Files (x86)/Microsoft/Edge/Application/msedge.exe" --remote-debugging-port=9222 --profile-directory=Default --window-position=-2400,-2400
                                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                                  • Uses browser remote debugging
                                                                                                                                                                                                                                                                                  PID:5900
                                                                                                                                                                                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x23c,0x240,0x244,0x238,0x2f4,0x7fffbd37f208,0x7fffbd37f214,0x7fffbd37f220
                                                                                                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                                                                                                      PID:7080
                                                                                                                                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1968,i,14866917634880097888,7624704180387689421,262144 --variations-seed-version --mojo-platform-channel-handle=2196 /prefetch:3
                                                                                                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                                                                                                        PID:2840
                                                                                                                                                                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2164,i,14866917634880097888,7624704180387689421,262144 --variations-seed-version --mojo-platform-channel-handle=2160 /prefetch:2
                                                                                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                                                                                          PID:2196
                                                                                                                                                                                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2372,i,14866917634880097888,7624704180387689421,262144 --variations-seed-version --mojo-platform-channel-handle=2760 /prefetch:8
                                                                                                                                                                                                                                                                                          4⤵
                                                                                                                                                                                                                                                                                            PID:1240
                                                                                                                                                                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9222 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3520,i,14866917634880097888,7624704180387689421,262144 --variations-seed-version --mojo-platform-channel-handle=3552 /prefetch:1
                                                                                                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                                                                                                            • Uses browser remote debugging
                                                                                                                                                                                                                                                                                            PID:3984
                                                                                                                                                                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9222 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3528,i,14866917634880097888,7624704180387689421,262144 --variations-seed-version --mojo-platform-channel-handle=3596 /prefetch:1
                                                                                                                                                                                                                                                                                            4⤵
                                                                                                                                                                                                                                                                                            • Uses browser remote debugging
                                                                                                                                                                                                                                                                                            PID:2312
                                                                                                                                                                                                                                                                                    • C:\Windows\system32\vssvc.exe
                                                                                                                                                                                                                                                                                      C:\Windows\system32\vssvc.exe
                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                      • Checks SCSI registry key(s)
                                                                                                                                                                                                                                                                                      PID:2824
                                                                                                                                                                                                                                                                                    • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                                                                                                                                                                                                                                                                      "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                                        PID:6524
                                                                                                                                                                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                                                                                                                                                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                          PID:3428
                                                                                                                                                                                                                                                                                        • C:\Windows\system32\BackgroundTaskHost.exe
                                                                                                                                                                                                                                                                                          "C:\Windows\system32\BackgroundTaskHost.exe" -ServerName:BackgroundTaskHost.WebAccountProvider
                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                            PID:5700

                                                                                                                                                                                                                                                                                          Network

                                                                                                                                                                                                                                                                                          MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                                                                          Replay Monitor

                                                                                                                                                                                                                                                                                          Loading Replay Monitor...

                                                                                                                                                                                                                                                                                          Downloads

                                                                                                                                                                                                                                                                                          • C:\Config.Msi\e5825f3.rbs

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            55KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            608a618c4fbdd378dbf3ce318da00b0c

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            cabb6d5e6e0d6dad6151a90bcdc71b33629ff9ff

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            34122d75a4706bbcb5fde21ec124cc8c7d2c05add7fbe80a1d4e9a4051fbe6c1

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            383df19aeefea043eb0723717dd7e7c7f1733559843afae498b16fa7d372fb2fa0a1f4ec862a8c76568d719a63096b941cee534c3b529ec651659920e62111c6

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            40B

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            d56cf9f768092279fa5b9e3247256148

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            05b943e4043cbd5ec65762ffc0359e578c440ee3

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            8cbbc9983b60f07744442f8863f6148ded79f7cd8c654a84df6243ea27037722

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            1cd9641cbcc4dd04326afa94f9373f576a31f26c752747b8554b06ef0ebf16ba78462cbdba859d95e57e0217cd8e2e01904a280327b61f7f3daca292b4d3a663

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            649B

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            91c88ac4e759904acdb970cd214ed2c2

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            7f769e91b0acd9268352516d4e00556cbd673294

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            2afd028acbc41642ce63d23a57f37a351d78b1d24dfa9053231ac0d5f54d8be2

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            fcf0749028f5dddf524e483ce890b1cf0b5c88d84c574d9b53de1dc912085d6ea302e0a0c8c33f2be27870c2ed904fdc938009d0ab325fe75951faa33a436bdf

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\LOG

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            332B

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            3dc802d5cb86f025fd26644d592f6468

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            d6887c8fc66b98b1913c343a4abbc5a2a1dd9539

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            f1a4a304944a51778ca07cc3c97b363d3ccd271966626d0354f4580e52b4a48c

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            a5efbfaf2e45917cddc2b1784c8e420037b015adc56d39962afe664495d30f5a25015e721eb875e21fc36e6ff2194ef69514a655624b9c87fca00b3dc3673d8c

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            2B

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            d751713988987e9331980363e24189ce

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            10KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            9b529970866e4991f2290860d303d646

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            a2c780a0bf5312da440b61639712a0c7e592c019

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            bb0dd7e1b7586aab4fbc72f00e27efa8269e4093993c2898b8bdd870681e5446

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            2a3bdd502df9575010fff52cb25e2cb94f7f10cac2b468aba5c39190ff6c28134949572f0fdc246af08318a9d5905cb8628045fe8e970a5904a1e9f4fc28dc38

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            15KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            0e041b8beb62109bc612bd433aecbfbd

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            15b0515597c527f32376c2faf6d7f4084d208ab8

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            749129b2c7e5e151a012ba92a99b29c216369146a1469915fb7d4eaa4c1700f2

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            f8581544274d402fb6345c08b1bc8972b9156218704e2bed646a61e2af28029072a8c9eab331475d60647b2648f827d93b6eee8d386acb3c1fa14c35678f5573

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            72B

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            e26ea0943d705460cdf0c2c27e9f5c38

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            4e47c21420fdb92fba0a67cee7b85adaffca0a7f

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            02741d84eab0b9e9faba5d12b039ac39e728435799961b7741c71381210ecfd4

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            f8e0ce1f13aaf0316176f2ff04373ff36f5933bb22951d25b23759a89f85660b6ab9d7456e2f3b9b0f52c2e784eb7e4681cb22f1b171625b08f5fed0ea43b100

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5796d1.TMP

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            48B

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            137faf535d361d7b251a3f10de6b9131

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            210c7cc55026d066926adc7859ad44c4363de1e4

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            ffa063454e4b7909797590448ab9dd070f091322760bc39225005c63d5c23248

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            841456a8c1f66d5c7b58f80692cc624762a56a64aad17c8a66dfc2eea7656fd84a76514bc43d6e0a851fddfc35137f744779cac75d5297a19262f95588f9f1ab

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Data

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            130KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            3c9efa6cde5d9ed28adc659e0f4ae1ad

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            6a8c9882d722457f0d97ee2577a4745b1667ffba

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            8d60d95a3a752f1caad8879ad1df7e8c58aca1a2a55eca6872b10edfccdc1518

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            149bf3cf6717fd7bfb30a3dce1e70ad94748e692237cd61327377d6c79eaf4c58ccf5b40c64768906d3bd1819195dd7d8595974b5481cc286a1ddbf669140794

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            81KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            be8a508b86c6b32b7ae4c55963cd30c2

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            fb55e6db33ecd44e0121adaccf9a8344c7d5174e

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            4b5e089d41a4e81a06100f0da448fc228ec32b959666c43a1764e71b0cdd486b

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            a7f3854b17cd20ad5716b297858154465c5d66ae07b5d3edfa8f9ff53b3d97b9eb33bc85c81155cb02df0342d545eb3843fa7d680c1badf84976cf801b275ea8

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            80KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            87d99461dfbbf9115ceea08a74f97e5f

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            cdff87cbaa8564eb826344759d4da5d7f302c92d

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            288e7b2fd882187c4eebc04f79551b70ddc4cfbedce03f5da70663a9b7a0a535

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            56be122cdc8f327c4a5a429b030b6e38197e9e835b57f1bbafe9a4b79d0ed185870e26f0d10828641148cda407f5325368f9c2603656fca2b108d627963e27d0

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            82KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            8c9208f5fe54b62a7e8dade34407e38a

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            5a09ef54a5e3b7f35d20d4d977245d2c446ad81d

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            3a3d966e62c891aeb285b8ebb848f1ffeedaa7f822d4d365a0efcc4ce454ca56

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            c85781bdeaf385b6729ca2187d4b666f3df4527dfc1827b54240bb9ad1b21e928751f9ac5b39e13a834555ee12043ee3b7776bbf989cb8f357dd03cf5b76473b

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            81KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            a89047445227f6e782b5f56336937aaa

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            f9d42e06b30ad4dfeb3c36d84f94529311f05906

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            ac69b008b75e3c7c56bdac92b4d2966fd94379adb488e2dcf8961b466668005a

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            8686ddde56b77ec59974d59cf91e468ffe6d5514f55c1824de45d25a48c3a0042455ca318e717f8a81a61d90e8a49660ad8a55670ce7be7b17a375f4d76339b5

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            3KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            50c591ec2a1e49297738ea9f28e3ad23

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            137e36b4c7c40900138a6bcf8cf5a3cce4d142af

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            7648d785bda8cef95176c70711418cf3f18e065f7710f2ef467884b4887d8447

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            33b5fa32501855c2617a822a4e1a2c9b71f2cf27e1b896cf6e5a28473cfd5e6d126840ca1aa1f59ef32b0d0a82a2a95c94a9cc8b845367b61e65ec70d456deec

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            280B

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            df2d1721cd4e4eff7049314710dc7c11

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            f5aed0158b2c0a00302f743841188881d811637a

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            ba336ffd1b01965d7ab0e5fac5415e43cb594139c76b19e4c0d9b5b3b67c1e93

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            11fd520176193f284563c7d050e6a7ab4e9895bac49fdc05759bab2c8a69f224858ccc784b351fc1d3ee5d39345430f9234623c9390978d7daf6a08ff5576ef4

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            2KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            1dbc7648169c010aa8a576588a806383

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            f0842317bdd058a7d87227c7077265b36bfd7f14

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            85d96facf9133d00d482ed7504e4e03fc45b3b1e5f19a138f2fcebac66436973

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            556ecd6de2ec7996d176a3728cc93d7c3cd60112fc3462417dffade33d0298f74d017f9c96758e90dbfbbfc7f8da53a5897f90dcf42d80aab400168b9590ce52

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\index.txt

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            325B

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            68fbb26e419b57427d158160a337dd5c

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            d7a745b2a97b9c146de5df66fa89e5046467d267

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            73950272752530e79e76183c4f92c929b65785e481d268c6bd678b6a62485c4b

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            348dd1ee262cd66f88d5aec2b04974fa25cacaec336a2a9a98656e8192a81de5e4c9a0c301b529e8a34e3aa1a69bf1b51c625a22a95c3d457dd53c9a943c3cac

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\e9e7748d-80ab-4cff-b1af-59b13ecd6493.tmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            1B

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            5058f1af8388633f609cadb75a75dc9d

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            40KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            9c5e5e484c8e7f995e09ec7d2f4b799c

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            2b9857d501ee6614379f50432d3631bdc7692da2

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            dfa4931294402f3972ec3c426246bd4cd29e3cf0b8491ee519abcdfed6bd5f5c

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            cb00089e699625752cf62b918c237fdf54a66d7f01450c8e7dee8f5f52f809e55ad2f499c07b2078cea95078d1da78b3ad6404423f701f4cb1d5d47c52ccc2d7

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            2KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            28c65370f12e84b734af87ad491ea257

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            402d3a8203115f1365d48fa72daf0a56e14d8a08

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            4ea873fb3d77a2f8eefae82c943f621f16723516e181bde133568f8f0c91290c

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            56eb34162b0a39da4aaf66aad35ef355a7709982b5060792e3b4849c36650725176e927815537ec58e7ddf0fb1763066b203d6b7f9d1b3dd2c8bc091c0c850cc

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            2KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            2f87410b0d834a14ceff69e18946d066

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            f2ec80550202d493db61806693439a57b76634f3

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            5422bc17b852ad463110de0db9b59ffa4219e065d3e2843618d6ebbd14273c65

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            a313702f22450ceff0a1d7f890b0c16cf667dbcd668dbafa6dbecd0791236c0bc68e834d12113cc75352365c2a2b6cfcf30b6ef7c97ea53ed135da50de389db4

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            2KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            7a1e03fe1039bf494d77070f2c583626

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            bb6b31d644873fea13cb3c37e6225670b5682c8b

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            53bb6e31c2534c61d2bb23c0ef4d9550c1b9361610bd01ef1816a97297147ed2

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            e45c36ab8a4ba0c84783b2ddb2c26a9ab66cd5d26f1f0999b1288656288b1f8f33922a92c05641e6dfad03fac708525a1a37815d8ce1088ed0c72217e2f82827

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            1KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            bf4b73bd7b434e7564301a0b68cf80d2

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            2b6713b96a19b2950ae10a7e59c30f44551de2b1

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            e0123cab6ad49f81dc16c0b03fb1801fdb18fc043971cb25b62c812c6bf9fa14

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            202b4f201aa139dc573c610f03ff04f26cbddc3ebcd5985f046306b7fe98c480014bed4629919e22099bb9ebf845fc3ff51f91378471c25c23a6ec06002378ab

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Programs\piastra\chrome_100_percent.pak

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            132KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            a0e681fdd4613e0fff6fb8bf33a00ef1

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            6789bacfe0b244ab6872bd3acc1e92030276011e

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            86f6b8ffa8788603a433d425a4bc3c4031e5d394762fd53257b0d4b1cfb2ffa2

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            6f6a1a8bfe3d33f3fa5f6134dac7cd8c017e38e5e2a75a93a958addbb17a601c5707d99a2af67e52c0a3d5206142209703701cd3fab44e0323a4553caee86196

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Programs\piastra\chrome_200_percent.pak

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            190KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            c37bd7a6b677a37313b7ecc4ff01b6f5

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            79db970c44347bd3566cefb6cabd1995e8e173df

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            8c1ae81d19fd6323a02eb460e075e2f25aba322bc7d46f2e6edb1c4600e6537a

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            a7b07133fa05593b102a0e5e5788b29488cb74656c5ee25de897c2ba2b2a7b05c0663ade74a003f7d6df2134d0b75f0ad25e15e9c9e0969e9453b7fc40b9f8bb

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Programs\piastra\d3dcompiler_47.dll

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4.7MB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            2191e768cc2e19009dad20dc999135a3

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            f49a46ba0e954e657aaed1c9019a53d194272b6a

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            7353f25dc5cf84d09894e3e0461cef0e56799adbc617fce37620ca67240b547d

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            5adcb00162f284c16ec78016d301fc11559dd0a781ffbeff822db22efbed168b11d7e5586ea82388e9503b0c7d3740cf2a08e243877f5319202491c8a641c970

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Programs\piastra\ffmpeg.dll

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            2.8MB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            14e00bf1d9d0df65f8b1a31240d474a8

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            f9fe033725b7b1b5c0efce7a14ed7ab223cb32e8

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            9d1eb0c6eb12bfa87e74a65c2fde5d61c4c93e21fb0800bbdccb6559527036a5

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            652724450296a739de802ba8fac482953146f37665718446e448a350295e1e7b09bd460835bcd0ac26b2e54bb9b791624a9eea11e6c96573c7c4aed22450ed14

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Programs\piastra\icudtl.dat

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            10.2MB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            e0f1ad85c0933ecce2e003a2c59ae726

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            a8539fc5a233558edfa264a34f7af6187c3f0d4f

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            f5170aa2b388d23bebf98784dd488a9bcb741470384a6a9a8d7a2638d768defb

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            714ed5ae44dfa4812081b8de42401197c235a4fa05206597f4c7b4170dd37e8360cc75d176399b735c9aec200f5b7d5c81c07b9ab58cbca8dc08861c6814fb28

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Programs\piastra\libEGL.dll

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            477KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            1dcf5ac3cb0dcda9c9679eeb018d01bd

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            bc21697c5665aab5eaaba61f55719d43328f7e7c

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            9cfc3001191e8b3eb9c96ba29e57e5bf9aaab264e83897e47cb968167a8a811b

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            47d8769bf00cc7555479542abf5e0684799e424d9801dad8c6bd199680d9c40cfa2380d969515db7a0753cf6f3a9733b5afb931fe33863fe30a37092d8dc96b1

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Programs\piastra\libGLESv2.dll

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            7.3MB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            51378647d290f3a08affa8454a3d59d5

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            32152a6677c82ea9e2e842baa907d708b46a6779

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            80c2ef6ca6d0ff4877bd0c0bc082ff19c3a5002d53648bcf5f54368560f9a411

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            ca90f5131d95fdb1e4a5cb7cb2bbef08676f70367b255270871754f776937994e34258084bf46437b25e1745728c279594d64e0718643eac0ac00cfc43d2c53b

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Programs\piastra\locales\en-US.pak

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            411KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            626f30cfd9ad7b7c628c6a859e4013bd

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            02e9a759c745a984b5f39223fab5be9b5ec3d5a7

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            0fd74bb69ad35b3f9391fa760bf0eb0ee73d2bea0066244577ef2abd269513de

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            9ce902f21fef70c5b5af444b532b36c9a00d896878cb4021c9b1dc07aa3277d956bca65ee0adb68467eec113e535b60a8a5fb5414c7d0ca761ceae5c43b7d9a9

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Programs\piastra\resources.pak

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            5.2MB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            e2088909e43552ad3e9cce053740185d

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            24b23dd4cad49340d88b9cb34e54c3ca0eb0d27f

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            bba36d4d18d64d9627f54c54fd645c5ba459d25a59acc5228210bd707aef67fd

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            dcefacddec38d8941c7d2d7b971b6f22dd0acb4116e48891d1d48a4d88968da12b152ccb7591715c88f8e14c315e235d1c4e6852cc38b9246091c50226900de6

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Programs\piastra\resources\app.asar.unpacked\node_modules\ds-view\build\Release\DirectShowModule.node

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            276KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            8bd63caaa47cd503e9b17e26b2485a5b

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            61f0ec58bbfe9f4995eb57ca0b3960553fa39a09

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            535e5f40bdbef7fdbbec49284f3682f4344f93c44aa159e70acaf8e3f5c11246

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            7ff9c2bbec0abb08fc3105b5b3ec47560472a9d45a28c0887fe42737957392fdd81fcec1683ef4fc945765c1ec42411f3594aa22b09b1833eb8132149dbf4f72

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Programs\piastra\resources\app.asar.unpacked\node_modules\pccompinfo\build\Release\addon.node

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            127KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            ecb7d55aacccc2dd8b5d04e66063d32d

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            1738607382b1b9942c386fc6d59ced4adce7b971

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            ad4aa384291c752cbdea2148b8365e0430bced22049c1e1c4d1fca82557d3d5d

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            6a111255791b734c37621e3b52d3a8909f77f6ba8d9cd87e64c38e2854534b81e106c0fc5427be1df8c5a1d8c238f03ab215be0a7202eaabdd77dc136d3ac6ea

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Programs\piastra\resources\app.asar.unpacked\node_modules\procid-listing\build\Release\addon.node

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            121KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            2698a47a4b2707b0579122293cbf1ad2

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            8f5f5ad49b4173ee0d7e534de566b4e68aeeeaf4

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            30b3b22b35c845868eb333e10b6e6191cb0ecb7c25bfa9a0314dc5fa7a3dfb09

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            40053b8c6030bdf557c1ca284812f79f8e251e96a7180a823d7d2b1cc5ced5c605bb5ec7ca7292cf19891467059026b1c5e2b0b536c48f54787ee118b950f2d2

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Programs\piastra\resources\app.asar.unpacked\node_modules\sqlite3\lib\binding\napi-v6-win32-unknown-x64\node_sqlite3.node

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            1.8MB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            3072b68e3c226aff39e6782d025f25a8

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            cf559196d74fa490ac8ce192db222c9f5c5a006a

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            7fb52b781709b065c240b6b81394be6e72e53fe11d7c8e0f7b49dd417eb78a01

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            61ebc72c20195e99244d95af1ab44fa06201a1aee2b5da04490fdc4312e8324a40b0e15a7b42fab5179753d767c1d08ae1a7a56ac71a6e100e63f83db849ee61

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Programs\piastra\resources\app.asar.unpacked\node_modules\windcrypt\build\Release\windcrypt.node

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            154KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            8259356d73c497b875fc51c515773ffb

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            e910fad2235c62d5edc6ea181ecbb1424c22b86a

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            edd88ef51a1cbee6c622e97be67a7a925a72607ee6d47e4118ac5a193221c1c6

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            5a3ec9485e3e58a333c8ba442c26350fac7504910d20f8e1e247a67d915042148d1106e98cb058da37c1825a0befec0f57636846a5a36a12677f394ced5f4714

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Programs\piastra\v8_context_snapshot.bin

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            611KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            1a37f6614ff8799b1c063bc83c157cc3

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            8238b9295e1dde9de0d6fd20578e82703131a228

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            4fbe07f71b706c2a2948eba9a6b1979e23c83342b190723a6ec5251b2d6dad7c

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            6677f65a0e26fdc2cff6cef0231f5e5f0713ee7c5cf7f488599a3c7ac3e8365afaec10b35d6145ea58d364151d8bcb08308765693a9797ea99b894d6e8224ac7

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Programs\piastra\vk_swiftshader.dll

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            4.9MB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            0b0658bf4f8cf397e1deddc50d67523f

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            8fcf0726ee1272a3d5c65d50be1626f1b1f49477

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            94adcd97d1cdd459d21f0b5b57e0caf4c5c6e44f7bc6fc6a73f0bd133e8d551e

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            d745424644b66783dc8cf6dd043f27356f25afcda679ed43672fc0caf33c7339006f033e0fb392c865a5eb3e9f0e5edf37154e77121ba5a71893420da26b7cd5

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\XP7w0oheltJo_tezmp.ps1

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            728B

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            51d3292084119377b00e5420c218e624

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            82e555b675ee54cc522975d0d8a0c720feef436c

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            e21e8591091bd2462923b2b2b7507982772e0e4edbe647c955c9ba38e5b2c07f

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            6037e3aa997a59c0a09244ece01df2f17c1ac0f423cc7f11e3f160c4b9bb240582ae7a6e302f5b035b9aabdaec76dd6447bd48dd9898e8aed9c84ec6c2194237

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ujpej2cm.pjk.ps1

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            60B

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Stellarconquest.lnk

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            2KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            baed441f6cb6d75f2ab80c13ea2578c2

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            b628b447ee53fad8e5a1ad863f0c61053805825b

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            aa4616809c55ba3f3c5cf7b17ca1e690c371bf0c0309d11a400fdece5a97a69b

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            bbf70c356597e444cc94216689aefdf7563dedd6e087352dc641106961cd89c830e3633c6af8603eb71b6c54757681ac35ffc3a58611255095983a1a432ce0d0

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Stellarconquest.lnk~RFe58394b.TMP

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            2KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            1a61495a7b83bc4d543510da7d21989e

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            8c30361b126ba2d11fe4c7a553b4a56bf885db66

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            ff93ec5eb97b6fe98cf00384dd5c057fab063ea18e1d4dffa1980190216e5cad

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            a9afce78cae82d3a31dcb73a33bd56a42eabbab0462a8123247db2c82b57411ac4409f07271ba3fe4691372d5647743feb49387c3eb3045cdd111b81afb06907

                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ahkgvp67.default-release\places.sqlite_tmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            5.0MB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            b658ce6e41b58e900d7eb710088ca582

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            7b3479ed9820b66c95f3b268f0db1ecae9541b99

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            6c344d7a43b2276e920429884b1b7d732073c088d706d07beca61377c8ab0d26

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            57d937794c29b125a60482964216e27910ffd363ad5ba180b8375ca2cdbb4cacd571e1a3e63e0dba46dd7d99af0da3afe12f5095842a91568558b66ae0f822de

                                                                                                                                                                                                                                                                                          • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            24.1MB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            77caee661c4161cefd9bc9a9410e3fe0

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            2f7c9a7bbc455083202ae9f413f2a62706af8605

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            87b7cb1dc7544ff7f0451d304b5c193ea2e439add97782690724f08ac1793988

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            36758cab60272fad13dd50f507f45bea183130389d83d246fa5d8418ee1a2ecd4b968cf0835720ce3605dbd01df02bf6d24b32db2260ca7a9a1df9329a3049ab

                                                                                                                                                                                                                                                                                          • \??\Volume{2c2b4495-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{266caafe-f53a-40bf-a423-14c3d9324f62}_OnDiskSnapshotProp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            6KB

                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                            ba679a266b84859ea60c371ecfb1dc06

                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                            02c102317fb9dc03af3b27134f38391ee04633eb

                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                            67cdb11a00eca9fbc036419988f01b4aa661221babc832c7046b1b454d1569f9

                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                            90dc396d14d09441caac12a7e210e5549c637d78e3eed20fbaab526e1ea23b7febcf1e05670b5d61b02d8bcaf07740104ec1d1e305cea327b436c7007ee4216a

                                                                                                                                                                                                                                                                                          • memory/1456-503-0x000001F4D7C60000-0x000001F4D7CD6000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            472KB

                                                                                                                                                                                                                                                                                          • memory/1456-502-0x000001F4BF5E0000-0x000001F4BF624000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            272KB

                                                                                                                                                                                                                                                                                          • memory/3956-521-0x000001E8CDA40000-0x000001E8CDA64000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            144KB

                                                                                                                                                                                                                                                                                          • memory/3956-520-0x000001E8CDA40000-0x000001E8CDA6A000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            168KB

                                                                                                                                                                                                                                                                                          • memory/6124-389-0x00000222E9580000-0x00000222E95A2000-memory.dmp

                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                            136KB