Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    307s
  • max time network
    310s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240708-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240708-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/07/2024, 17:32

Errors

Reason
Machine shutdown

General

  • Target

    https://cdn.novafn.dev/Assets/NovaLauncher.Setup.msi

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_R_E_A_D___T_H_I_S___5PRH6JJ_.txt

Family

cerber

Ransom Note
Hi, I'am CRBR ENCRYPTOR ;) ----- ALL YOUR DOCUMENTS, PH0T0S, DATABASES AND OTHER IMPORTANT FILES HAVE BEEN ENCRYPTED! ----- The only one way to decrypt your files is to receive the private key and decryption program. To receive the private key and decryption program go to any decrypted folder, inside there is the special file (*_R_E_A_D___T_H_I_S_*) with complete instructions how to decrypt your files. If you cannot find any (*_R_E_A_D___T_H_I_S_*) file at your PC, follow the instructions below: ----- 1. Download "Tor Browser" from https://www.torproject.org/ and install it. 2. In the "Tor Browser" open your personal page here: http://xpcx6erilkjced3j.onion/D2C7-244B-A15C-0098-B9D4 Note! This page is available via "Tor Browser" only. ----- Also you can use temporary addresses on your personal page without using "Tor Browser". ----- 1. http://xpcx6erilkjced3j.1n5mod.top/D2C7-244B-A15C-0098-B9D4 2. http://xpcx6erilkjced3j.19kdeh.top/D2C7-244B-A15C-0098-B9D4 3. http://xpcx6erilkjced3j.1mpsnr.top/D2C7-244B-A15C-0098-B9D4 4. http://xpcx6erilkjced3j.18ey8e.top/D2C7-244B-A15C-0098-B9D4 5. http://xpcx6erilkjced3j.17gcun.top/D2C7-244B-A15C-0098-B9D4 ----- Note! These are temporary addresses! They will be available for a limited amount of time! -----
URLs

http://xpcx6erilkjced3j.onion/D2C7-244B-A15C-0098-B9D4

http://xpcx6erilkjced3j.1n5mod.top/D2C7-244B-A15C-0098-B9D4

http://xpcx6erilkjced3j.19kdeh.top/D2C7-244B-A15C-0098-B9D4

http://xpcx6erilkjced3j.1mpsnr.top/D2C7-244B-A15C-0098-B9D4

http://xpcx6erilkjced3j.18ey8e.top/D2C7-244B-A15C-0098-B9D4

http://xpcx6erilkjced3j.17gcun.top/D2C7-244B-A15C-0098-B9D4

Signatures

  • Cerber

    Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.

  • Floxif, Floodfix

    Floxif aka FloodFix is a file-changing trojan and backdoor written in C++.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Detects Floxif payload 1 IoCs
  • Contacts a large (1115) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Downloads MZ/PE file
  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 24 IoCs
  • Loads dropped DLL 11 IoCs
  • UPX packed file 23 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in System32 directory 38 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 21 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Program crash 11 IoCs
  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies data under HKEY_USERS 16 IoCs
  • Modifies registry class 3 IoCs
  • NTFS ADS 6 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 32 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 50 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://cdn.novafn.dev/Assets/NovaLauncher.Setup.msi
    1⤵
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4804
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffca019ab58,0x7ffca019ab68,0x7ffca019ab78
      2⤵
        PID:1144
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1680 --field-trial-handle=1960,i,13139879600645884274,18136755918152336832,131072 /prefetch:2
        2⤵
          PID:2516
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2068 --field-trial-handle=1960,i,13139879600645884274,18136755918152336832,131072 /prefetch:8
          2⤵
            PID:3900
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2248 --field-trial-handle=1960,i,13139879600645884274,18136755918152336832,131072 /prefetch:8
            2⤵
              PID:2788
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3000 --field-trial-handle=1960,i,13139879600645884274,18136755918152336832,131072 /prefetch:1
              2⤵
                PID:964
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3008 --field-trial-handle=1960,i,13139879600645884274,18136755918152336832,131072 /prefetch:1
                2⤵
                  PID:4572
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4644 --field-trial-handle=1960,i,13139879600645884274,18136755918152336832,131072 /prefetch:8
                  2⤵
                    PID:4884
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4364 --field-trial-handle=1960,i,13139879600645884274,18136755918152336832,131072 /prefetch:8
                    2⤵
                      PID:1344
                  • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                    "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                    1⤵
                      PID:3320
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
                      1⤵
                      • Enumerates system info in registry
                      • Modifies registry class
                      • NTFS ADS
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                      • Suspicious use of FindShellTrayWindow
                      • Suspicious use of SendNotifyMessage
                      PID:2868
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffc9f9746f8,0x7ffc9f974708,0x7ffc9f974718
                        2⤵
                          PID:1612
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,2648758410532194135,5830994894724088020,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:2
                          2⤵
                            PID:4092
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,2648758410532194135,5830994894724088020,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:3
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:2980
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,2648758410532194135,5830994894724088020,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:8
                            2⤵
                              PID:1172
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,2648758410532194135,5830994894724088020,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3500 /prefetch:1
                              2⤵
                                PID:3620
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,2648758410532194135,5830994894724088020,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3532 /prefetch:1
                                2⤵
                                  PID:4876
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,2648758410532194135,5830994894724088020,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4512 /prefetch:1
                                  2⤵
                                    PID:3156
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,2648758410532194135,5830994894724088020,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:1
                                    2⤵
                                      PID:4372
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,2648758410532194135,5830994894724088020,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4328 /prefetch:8
                                      2⤵
                                        PID:4148
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,2648758410532194135,5830994894724088020,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4328 /prefetch:8
                                        2⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:1816
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,2648758410532194135,5830994894724088020,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3788 /prefetch:1
                                        2⤵
                                          PID:4548
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,2648758410532194135,5830994894724088020,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3600 /prefetch:1
                                          2⤵
                                            PID:1072
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,2648758410532194135,5830994894724088020,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4484 /prefetch:1
                                            2⤵
                                              PID:3404
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,2648758410532194135,5830994894724088020,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:1
                                              2⤵
                                                PID:4128
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,2648758410532194135,5830994894724088020,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:1
                                                2⤵
                                                  PID:3540
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2100,2648758410532194135,5830994894724088020,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5032 /prefetch:8
                                                  2⤵
                                                    PID:3784
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2100,2648758410532194135,5830994894724088020,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5648 /prefetch:8
                                                    2⤵
                                                    • Modifies registry class
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:2856
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,2648758410532194135,5830994894724088020,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3784 /prefetch:1
                                                    2⤵
                                                      PID:5052
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,2648758410532194135,5830994894724088020,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:1
                                                      2⤵
                                                        PID:1616
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,2648758410532194135,5830994894724088020,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:1
                                                        2⤵
                                                          PID:4140
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2100,2648758410532194135,5830994894724088020,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=6256 /prefetch:8
                                                          2⤵
                                                            PID:4276
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,2648758410532194135,5830994894724088020,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1348 /prefetch:1
                                                            2⤵
                                                              PID:4832
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2100,2648758410532194135,5830994894724088020,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6796 /prefetch:8
                                                              2⤵
                                                                PID:4084
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2100,2648758410532194135,5830994894724088020,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6796 /prefetch:8
                                                                2⤵
                                                                  PID:732
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2100,2648758410532194135,5830994894724088020,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6768 /prefetch:8
                                                                  2⤵
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  PID:1812
                                                                • C:\Users\Admin\Downloads\Mabezat (1).exe
                                                                  "C:\Users\Admin\Downloads\Mabezat (1).exe"
                                                                  2⤵
                                                                  • Executes dropped EXE
                                                                  PID:1572
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,2648758410532194135,5830994894724088020,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5944 /prefetch:2
                                                                  2⤵
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  PID:4008
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,2648758410532194135,5830994894724088020,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1292 /prefetch:1
                                                                  2⤵
                                                                    PID:3512
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2100,2648758410532194135,5830994894724088020,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5964 /prefetch:8
                                                                    2⤵
                                                                      PID:3548
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2100,2648758410532194135,5830994894724088020,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1956 /prefetch:8
                                                                      2⤵
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      PID:1800
                                                                    • C:\Users\Admin\Downloads\Floxif.exe
                                                                      "C:\Users\Admin\Downloads\Floxif.exe"
                                                                      2⤵
                                                                      • Executes dropped EXE
                                                                      • Loads dropped DLL
                                                                      • Drops file in Program Files directory
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:1168
                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 432
                                                                        3⤵
                                                                        • Program crash
                                                                        PID:3660
                                                                    • C:\Users\Admin\Downloads\Floxif.exe
                                                                      "C:\Users\Admin\Downloads\Floxif.exe"
                                                                      2⤵
                                                                      • Executes dropped EXE
                                                                      • Loads dropped DLL
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:3872
                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 432
                                                                        3⤵
                                                                        • Program crash
                                                                        PID:2504
                                                                    • C:\Users\Admin\Downloads\Floxif.exe
                                                                      "C:\Users\Admin\Downloads\Floxif.exe"
                                                                      2⤵
                                                                      • Executes dropped EXE
                                                                      • Loads dropped DLL
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:696
                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 696 -s 432
                                                                        3⤵
                                                                        • Program crash
                                                                        PID:3204
                                                                    • C:\Users\Admin\Downloads\Floxif.exe
                                                                      "C:\Users\Admin\Downloads\Floxif.exe"
                                                                      2⤵
                                                                      • Executes dropped EXE
                                                                      • Loads dropped DLL
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:464
                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 464 -s 432
                                                                        3⤵
                                                                        • Program crash
                                                                        PID:4644
                                                                    • C:\Users\Admin\Downloads\Floxif.exe
                                                                      "C:\Users\Admin\Downloads\Floxif.exe"
                                                                      2⤵
                                                                      • Executes dropped EXE
                                                                      • Loads dropped DLL
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:2128
                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 2128 -s 432
                                                                        3⤵
                                                                        • Program crash
                                                                        PID:1620
                                                                    • C:\Users\Admin\Downloads\Floxif.exe
                                                                      "C:\Users\Admin\Downloads\Floxif.exe"
                                                                      2⤵
                                                                      • Executes dropped EXE
                                                                      • Loads dropped DLL
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:3672
                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 3672 -s 404
                                                                        3⤵
                                                                        • Program crash
                                                                        PID:400
                                                                    • C:\Users\Admin\Downloads\Floxif.exe
                                                                      "C:\Users\Admin\Downloads\Floxif.exe"
                                                                      2⤵
                                                                      • Executes dropped EXE
                                                                      • Loads dropped DLL
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:4332
                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 4332 -s 432
                                                                        3⤵
                                                                        • Program crash
                                                                        PID:348
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,2648758410532194135,5830994894724088020,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6008 /prefetch:1
                                                                      2⤵
                                                                        PID:812
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2100,2648758410532194135,5830994894724088020,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5292 /prefetch:8
                                                                        2⤵
                                                                          PID:4632
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2100,2648758410532194135,5830994894724088020,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4032 /prefetch:8
                                                                          2⤵
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          PID:1404
                                                                        • C:\Users\Admin\Downloads\Cerber5.exe
                                                                          "C:\Users\Admin\Downloads\Cerber5.exe"
                                                                          2⤵
                                                                          • Checks computer location settings
                                                                          • Drops startup file
                                                                          • Executes dropped EXE
                                                                          • Enumerates connected drives
                                                                          • Drops file in System32 directory
                                                                          • Sets desktop wallpaper using registry
                                                                          • Drops file in Program Files directory
                                                                          • Drops file in Windows directory
                                                                          • Modifies registry class
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:1572
                                                                          • C:\Windows\SysWOW64\netsh.exe
                                                                            C:\Windows\system32\netsh.exe advfirewall set allprofiles state on
                                                                            3⤵
                                                                            • Modifies Windows Firewall
                                                                            • Event Triggered Execution: Netsh Helper DLL
                                                                            PID:4304
                                                                          • C:\Windows\SysWOW64\netsh.exe
                                                                            C:\Windows\system32\netsh.exe advfirewall reset
                                                                            3⤵
                                                                            • Modifies Windows Firewall
                                                                            • Event Triggered Execution: Netsh Helper DLL
                                                                            PID:4032
                                                                          • C:\Windows\SysWOW64\mshta.exe
                                                                            "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___O7KKVGM_.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
                                                                            3⤵
                                                                              PID:880
                                                                            • C:\Windows\SysWOW64\NOTEPAD.EXE
                                                                              "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___IJBZ55_.txt
                                                                              3⤵
                                                                              • Opens file in notepad (likely ransom note)
                                                                              PID:5092
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              "C:\Windows\system32\cmd.exe" /d /c taskkill /f /im "C" > NUL & ping -n 1 127.0.0.1 > NUL & del "C" > NUL && exit
                                                                              3⤵
                                                                                PID:1416
                                                                                • C:\Windows\SysWOW64\taskkill.exe
                                                                                  taskkill /f /im "C"
                                                                                  4⤵
                                                                                  • Kills process with taskkill
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:1168
                                                                                • C:\Windows\SysWOW64\PING.EXE
                                                                                  ping -n 1 127.0.0.1
                                                                                  4⤵
                                                                                  • Runs ping.exe
                                                                                  PID:1936
                                                                            • C:\Users\Admin\Downloads\Cerber5.exe
                                                                              "C:\Users\Admin\Downloads\Cerber5.exe"
                                                                              2⤵
                                                                              • Executes dropped EXE
                                                                              • Enumerates connected drives
                                                                              PID:3804
                                                                            • C:\Users\Admin\Downloads\Cerber5.exe
                                                                              "C:\Users\Admin\Downloads\Cerber5.exe"
                                                                              2⤵
                                                                              • Executes dropped EXE
                                                                              • Enumerates connected drives
                                                                              PID:4988
                                                                            • C:\Users\Admin\Downloads\Cerber5.exe
                                                                              "C:\Users\Admin\Downloads\Cerber5.exe"
                                                                              2⤵
                                                                              • Executes dropped EXE
                                                                              • Enumerates connected drives
                                                                              PID:4192
                                                                            • C:\Users\Admin\Downloads\Cerber5.exe
                                                                              "C:\Users\Admin\Downloads\Cerber5.exe"
                                                                              2⤵
                                                                              • Executes dropped EXE
                                                                              • Enumerates connected drives
                                                                              PID:2504
                                                                            • C:\Users\Admin\Downloads\Cerber5.exe
                                                                              "C:\Users\Admin\Downloads\Cerber5.exe"
                                                                              2⤵
                                                                              • Executes dropped EXE
                                                                              • Enumerates connected drives
                                                                              PID:4152
                                                                            • C:\Users\Admin\Downloads\Cerber5.exe
                                                                              "C:\Users\Admin\Downloads\Cerber5.exe"
                                                                              2⤵
                                                                              • Executes dropped EXE
                                                                              • Enumerates connected drives
                                                                              PID:516
                                                                            • C:\Users\Admin\Downloads\Cerber5.exe
                                                                              "C:\Users\Admin\Downloads\Cerber5.exe"
                                                                              2⤵
                                                                              • Executes dropped EXE
                                                                              • Enumerates connected drives
                                                                              PID:1404
                                                                            • C:\Users\Admin\Downloads\Cerber5.exe
                                                                              "C:\Users\Admin\Downloads\Cerber5.exe"
                                                                              2⤵
                                                                              • Executes dropped EXE
                                                                              • Enumerates connected drives
                                                                              PID:2040
                                                                            • C:\Users\Admin\Downloads\Cerber5.exe
                                                                              "C:\Users\Admin\Downloads\Cerber5.exe"
                                                                              2⤵
                                                                              • Executes dropped EXE
                                                                              • Enumerates connected drives
                                                                              PID:2448
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,2648758410532194135,5830994894724088020,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6928 /prefetch:1
                                                                              2⤵
                                                                                PID:3676
                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2100,2648758410532194135,5830994894724088020,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4256 /prefetch:8
                                                                                2⤵
                                                                                  PID:4412
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,2648758410532194135,5830994894724088020,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:1
                                                                                  2⤵
                                                                                    PID:1708
                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2100,2648758410532194135,5830994894724088020,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4940 /prefetch:8
                                                                                    2⤵
                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                    PID:4728
                                                                                  • C:\Users\Admin\Downloads\7ev3n.exe
                                                                                    "C:\Users\Admin\Downloads\7ev3n.exe"
                                                                                    2⤵
                                                                                    • Executes dropped EXE
                                                                                    • NTFS ADS
                                                                                    PID:4000
                                                                                    • C:\Users\Admin\AppData\Local\system.exe
                                                                                      "C:\Users\Admin\AppData\Local\system.exe"
                                                                                      3⤵
                                                                                      • Executes dropped EXE
                                                                                      PID:3140
                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                        C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\del.bat
                                                                                        4⤵
                                                                                          PID:1572
                                                                                        • C:\Windows\SysWOW64\SCHTASKS.exe
                                                                                          C:\Windows\System32\SCHTASKS.exe /create /SC ONLOGON /TN uac /TR "C:\Users\Admin\AppData\Local\bcd.bat" /RL HIGHEST /f
                                                                                          4⤵
                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                          PID:2968
                                                                                        • C:\windows\SysWOW64\cmd.exe
                                                                                          C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                                                          4⤵
                                                                                            PID:32
                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                              REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                                                              5⤵
                                                                                              • Modifies WinLogon for persistence
                                                                                              PID:3244
                                                                                          • C:\windows\SysWOW64\cmd.exe
                                                                                            C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                                                            4⤵
                                                                                              PID:3988
                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                                                                5⤵
                                                                                                • Adds Run key to start application
                                                                                                PID:2960
                                                                                            • C:\windows\SysWOW64\cmd.exe
                                                                                              C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout" /v "Scancode Map" /t REG_BINARY /d "00000000000000001700000000003800000038e000005be000005ce00000360000001d0000001de000000f000000010000001c0000003e0000003b00000044000000450000003d0000005de000000000" /f /reg:64
                                                                                              4⤵
                                                                                                PID:4756
                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                  REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout" /v "Scancode Map" /t REG_BINARY /d "00000000000000001700000000003800000038e000005be000005ce00000360000001d0000001de000000f000000010000001c0000003e0000003b00000044000000450000003d0000005de000000000" /f /reg:64
                                                                                                  5⤵
                                                                                                    PID:3112
                                                                                                • C:\windows\SysWOW64\cmd.exe
                                                                                                  C:\windows\system32\cmd.exe /c REG ADD "HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys" /v "Flags" /t REG_SZ /d 506 /f /reg:64
                                                                                                  4⤵
                                                                                                    PID:4180
                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                      REG ADD "HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys" /v "Flags" /t REG_SZ /d 506 /f /reg:64
                                                                                                      5⤵
                                                                                                        PID:2088
                                                                                                    • C:\windows\SysWOW64\cmd.exe
                                                                                                      C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "rgd_bcd_condition" /t REG_SZ /d 1 /f /reg:64
                                                                                                      4⤵
                                                                                                        PID:4496
                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                          REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "rgd_bcd_condition" /t REG_SZ /d 1 /f /reg:64
                                                                                                          5⤵
                                                                                                            PID:3436
                                                                                                        • C:\windows\SysWOW64\cmd.exe
                                                                                                          C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f /reg:64
                                                                                                          4⤵
                                                                                                            PID:3640
                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                              REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f /reg:64
                                                                                                              5⤵
                                                                                                              • UAC bypass
                                                                                                              PID:664
                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                            C:\Windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "crypted" /t REG_SZ /d 1 /f /reg:64
                                                                                                            4⤵
                                                                                                              PID:4000
                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "crypted" /t REG_SZ /d 1 /f /reg:64
                                                                                                                5⤵
                                                                                                                  PID:1580
                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                C:\Windows\system32\cmd.exe /c shutdown -r -t 10 -f
                                                                                                                4⤵
                                                                                                                  PID:3776
                                                                                                                  • C:\Windows\SysWOW64\shutdown.exe
                                                                                                                    shutdown -r -t 10 -f
                                                                                                                    5⤵
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    PID:684
                                                                                                          • C:\Windows\System32\CompPkgSrv.exe
                                                                                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                            1⤵
                                                                                                              PID:3880
                                                                                                            • C:\Windows\System32\CompPkgSrv.exe
                                                                                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                              1⤵
                                                                                                                PID:544
                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1168 -ip 1168
                                                                                                                1⤵
                                                                                                                  PID:208
                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 3872 -ip 3872
                                                                                                                  1⤵
                                                                                                                    PID:4800
                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 696 -ip 696
                                                                                                                    1⤵
                                                                                                                      PID:376
                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 464 -ip 464
                                                                                                                      1⤵
                                                                                                                        PID:2788
                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 2128 -ip 2128
                                                                                                                        1⤵
                                                                                                                          PID:736
                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3672 -ip 3672
                                                                                                                          1⤵
                                                                                                                            PID:4516
                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4332 -ip 4332
                                                                                                                            1⤵
                                                                                                                              PID:4836
                                                                                                                            • C:\Windows\System32\rundll32.exe
                                                                                                                              C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                                                                              1⤵
                                                                                                                                PID:1456
                                                                                                                              • C:\Users\Admin\Downloads\Floxif.exe
                                                                                                                                "C:\Users\Admin\Downloads\Floxif.exe"
                                                                                                                                1⤵
                                                                                                                                • Executes dropped EXE
                                                                                                                                • Loads dropped DLL
                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                PID:1168
                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 432
                                                                                                                                  2⤵
                                                                                                                                  • Program crash
                                                                                                                                  PID:3140
                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1168 -ip 1168
                                                                                                                                1⤵
                                                                                                                                  PID:2792
                                                                                                                                • C:\Users\Admin\Downloads\Floxif.exe
                                                                                                                                  "C:\Users\Admin\Downloads\Floxif.exe"
                                                                                                                                  1⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  • Loads dropped DLL
                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                  PID:3676
                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3676 -s 400
                                                                                                                                    2⤵
                                                                                                                                    • Program crash
                                                                                                                                    PID:5060
                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3676 -ip 3676
                                                                                                                                  1⤵
                                                                                                                                    PID:4500
                                                                                                                                  • C:\Users\Admin\Downloads\Floxif.exe
                                                                                                                                    "C:\Users\Admin\Downloads\Floxif.exe"
                                                                                                                                    1⤵
                                                                                                                                    • Executes dropped EXE
                                                                                                                                    • Loads dropped DLL
                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                    PID:4460
                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 4460 -s 400
                                                                                                                                      2⤵
                                                                                                                                      • Program crash
                                                                                                                                      PID:376
                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4460 -ip 4460
                                                                                                                                    1⤵
                                                                                                                                      PID:1528
                                                                                                                                    • C:\Users\Admin\Downloads\Floxif.exe
                                                                                                                                      "C:\Users\Admin\Downloads\Floxif.exe"
                                                                                                                                      1⤵
                                                                                                                                      • Executes dropped EXE
                                                                                                                                      • Loads dropped DLL
                                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                                      PID:4104
                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 4104 -s 400
                                                                                                                                        2⤵
                                                                                                                                        • Program crash
                                                                                                                                        PID:684
                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4104 -ip 4104
                                                                                                                                      1⤵
                                                                                                                                        PID:3960
                                                                                                                                      • C:\Windows\system32\LogonUI.exe
                                                                                                                                        "LogonUI.exe" /flags:0x4 /state0:0xa38d5855 /state1:0x41c64e6d
                                                                                                                                        1⤵
                                                                                                                                        • Modifies data under HKEY_USERS
                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                        PID:436

                                                                                                                                      Network

                                                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                                                      Replay Monitor

                                                                                                                                      Loading Replay Monitor...

                                                                                                                                      Downloads

                                                                                                                                      • C:\Program Files\Common Files\System\symsrv.dll

                                                                                                                                        Filesize

                                                                                                                                        72KB

                                                                                                                                        MD5

                                                                                                                                        ccf7e487353602c57e2e743d047aca36

                                                                                                                                        SHA1

                                                                                                                                        99f66919152d67a882685a41b7130af5f7703888

                                                                                                                                        SHA256

                                                                                                                                        eaf76e5f1a438478ecf7b678744da34e9d9e5038b128f0c595672ee1dbbfd914

                                                                                                                                        SHA512

                                                                                                                                        dde0366658082b142faa6487245bfc8b8942605f0ede65d12f8c368ff3673ca18e416a4bf132c4bee5be43e94aef0531be2008746c24f1e6b2f294a63ab1486c

                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                                                                                                        Filesize

                                                                                                                                        1KB

                                                                                                                                        MD5

                                                                                                                                        861888c47552bbfb74877f649e81cec4

                                                                                                                                        SHA1

                                                                                                                                        6b615be154f09ce994f6a9448f5593768e1962b0

                                                                                                                                        SHA256

                                                                                                                                        c46572dbd7ced20b0efaeb074cb20f1b29e9e691f760fee6315aabacd69380c8

                                                                                                                                        SHA512

                                                                                                                                        9249400881f6902f212362358edffa108bfcf2ac71e32732663cb1e5684f2f83fed9ffa73ad304e9ca7b4f2927217cb18bbbcced8df0ec1a6d58209fe6987bc8

                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                                                        Filesize

                                                                                                                                        2B

                                                                                                                                        MD5

                                                                                                                                        d751713988987e9331980363e24189ce

                                                                                                                                        SHA1

                                                                                                                                        97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                                                        SHA256

                                                                                                                                        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                                                        SHA512

                                                                                                                                        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                                                        Filesize

                                                                                                                                        6KB

                                                                                                                                        MD5

                                                                                                                                        7b814625629669639934dcaff4530ea5

                                                                                                                                        SHA1

                                                                                                                                        4e8fbe3388a8602b154955a6bea249e660eeac42

                                                                                                                                        SHA256

                                                                                                                                        25adb65a68cafca75bbefa5f2662228ec7b8bff8efacc07107c6f1097e9245ac

                                                                                                                                        SHA512

                                                                                                                                        726305da8ec30c005f51da376ac23bcc1eae914c729ff1dcc258e86bfe9082cc222fb65014880dcd93786c03088d16065c919bf14bba7ef6801e9db8129646c0

                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                                                        Filesize

                                                                                                                                        144KB

                                                                                                                                        MD5

                                                                                                                                        8bbbe52f84aa875e6fb7b51084793195

                                                                                                                                        SHA1

                                                                                                                                        9c332f0dd687340cf730a50bcee3a25dcb6fb70f

                                                                                                                                        SHA256

                                                                                                                                        6c74675df17b99963b85ce6d5b6b42f698cf804cec81a9dd68b8948922739f13

                                                                                                                                        SHA512

                                                                                                                                        c3a1489d2ec1afbbeaee8310a64a0a256ec5da499d229662c7ccd60b7c7caab9b042d09c562739e46295fbc989b05f8db9c67d75aab18b893ec0b22eb54e057e

                                                                                                                                      • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

                                                                                                                                        Filesize

                                                                                                                                        264KB

                                                                                                                                        MD5

                                                                                                                                        f50f89a0a91564d0b8a211f8921aa7de

                                                                                                                                        SHA1

                                                                                                                                        112403a17dd69d5b9018b8cede023cb3b54eab7d

                                                                                                                                        SHA256

                                                                                                                                        b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec

                                                                                                                                        SHA512

                                                                                                                                        bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                        Filesize

                                                                                                                                        152B

                                                                                                                                        MD5

                                                                                                                                        6ae84fc1e66cbbb7e9d28b0e12d64550

                                                                                                                                        SHA1

                                                                                                                                        100430bb653c896c11b94ac0bf2297a389ea5ad8

                                                                                                                                        SHA256

                                                                                                                                        856a9c0ac8c29f738a3501b6bd007fd8cbbac211e461b91f4caff52dd41da75c

                                                                                                                                        SHA512

                                                                                                                                        7fe7a8639d96118b843e67a6a6d397271b181dc6b049e6f7de77bee9c9214690b1b7f73164f7e463e117406dc978334ea02397fd639140598f60f89c6aaddbe8

                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                        Filesize

                                                                                                                                        152B

                                                                                                                                        MD5

                                                                                                                                        97f8be9c465b0ed67c2415868506c354

                                                                                                                                        SHA1

                                                                                                                                        cdb221d6debcf55615d3b5f30796e32065046dd9

                                                                                                                                        SHA256

                                                                                                                                        b606a1ee10b65eb9077e7d2f3b34a0d7a1ed6a4802a169fe55449c975332ee02

                                                                                                                                        SHA512

                                                                                                                                        a0fe0ed30624658127316873137f4fc488a5916005e5e3f1f55b7d6442b54010c08d7037b94d0cf3c3316b1bb4acf91bad9e64ee6d15302e3cdd62bb18730542

                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                        Filesize

                                                                                                                                        3KB

                                                                                                                                        MD5

                                                                                                                                        daf4eb7b384c2649fdfea02aa4fe45f5

                                                                                                                                        SHA1

                                                                                                                                        8fda78cb96edf8b7c1603243de8aa060c5d206f7

                                                                                                                                        SHA256

                                                                                                                                        9eb5832e7e2c17e3759ba79a3e3b9673c7e966be0c7441e77d0952ee5d24dbb8

                                                                                                                                        SHA512

                                                                                                                                        57a2b6af8468535aed0c6236aefc0e214301052c83a05f624dddb6b689ec7d3311113e426da3f4ac69aab0e8f8ede482f8364e5cd443c255bbdbf2eb8b8a190b

                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                        Filesize

                                                                                                                                        3KB

                                                                                                                                        MD5

                                                                                                                                        e61661cf431e9208e94c9dfecea4c23a

                                                                                                                                        SHA1

                                                                                                                                        20c5ac8ad8e4acdb3cb09a7a14eff0f6e0bf6d25

                                                                                                                                        SHA256

                                                                                                                                        96370977e2f0a9b52cdfd58b842b880cd4dfabc2ee205eb88f298680b874439d

                                                                                                                                        SHA512

                                                                                                                                        c8b20a1e94479aa86b098aecf0bb9a7b7b232ea010c40483547f237ad0901bf8ae10a90fa722ab89f7c9435ae650691f96d4a9e2e4ea43146bb172819e90ab06

                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                        Filesize

                                                                                                                                        779B

                                                                                                                                        MD5

                                                                                                                                        898de08cb9e79526bd2f2bb36a1dd409

                                                                                                                                        SHA1

                                                                                                                                        a1c3b86f8265373e44070211f333ba9792d51fa0

                                                                                                                                        SHA256

                                                                                                                                        364693dc1c9aa2b1755bec7af0a538e5fc98c94f029088d64f6da31a95031b87

                                                                                                                                        SHA512

                                                                                                                                        759fffae5d9fa305b89170258659c88988705429a3b863cb275bb0544e114377edbbb600c9ed2ba5ca4e0fe595d7310f449c957aab89249069819c623bfcbc3b

                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                        Filesize

                                                                                                                                        862B

                                                                                                                                        MD5

                                                                                                                                        316902e91dc29bcec5996f1f9e1d9277

                                                                                                                                        SHA1

                                                                                                                                        a7702e556c40ba46d9f9f7130ab85e153f97d7cc

                                                                                                                                        SHA256

                                                                                                                                        3c8f3431524e72f65075c7064ef3d8623502f86121fae87688b032f1caf5e89d

                                                                                                                                        SHA512

                                                                                                                                        05af55cc75d92862f49a5cc41b7108c9a2f739a67052d8007e2db07d87392abcd0f441be9869adc36f4dddc71c7881de3dc3df1c7e10e2b57f235114def8b959

                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                        Filesize

                                                                                                                                        6KB

                                                                                                                                        MD5

                                                                                                                                        a2995d1aa28abc7fab5c9caef45f65ac

                                                                                                                                        SHA1

                                                                                                                                        d5ec6b77eb7ab380a04f4cd8b51aa8dfea15a498

                                                                                                                                        SHA256

                                                                                                                                        8a419bd842581a487f24cd0e0a485bf990592e265f6811ec25e6a1fe46b071f3

                                                                                                                                        SHA512

                                                                                                                                        a7454473634dbf72e9437eaade9c8f03d624a26e015d12849008191ec58f15ef1c9dd38085075b6a077987d24058b0bb46c420b8bc84221e8a6f6dd49bbe2f84

                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                        Filesize

                                                                                                                                        7KB

                                                                                                                                        MD5

                                                                                                                                        aa2abf1fa7f1107eb284ab9f6e6d6fdc

                                                                                                                                        SHA1

                                                                                                                                        b5404c0fdf5740d0cc3b63cb7380e0ef7643975c

                                                                                                                                        SHA256

                                                                                                                                        3e6654e9201ec5ff9d047bd816d41dbb5cf08c04e85381d4e9f1ea8e3eacbb69

                                                                                                                                        SHA512

                                                                                                                                        61b181ad932a4818db3b4fe1c34e9de8d01df6d765d89dbb3486b699cec0748d3b598a014217a9f88b31b0d278459ee19a64d90f6559e5692c034ea83a2254e4

                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                        Filesize

                                                                                                                                        6KB

                                                                                                                                        MD5

                                                                                                                                        b4371c0216f7051f05bae235da0ea2b4

                                                                                                                                        SHA1

                                                                                                                                        b750276be4bd00df7946f25889f8195f434a7ccf

                                                                                                                                        SHA256

                                                                                                                                        00a56b6e7a37bedfd48bfb07ab8554a79f75fd33f13c8062cf9a1241643f21a3

                                                                                                                                        SHA512

                                                                                                                                        d5eb922011c7b817525c372d443f1df2ca80a417c265c26fbac60991776957feba356cf6378238eb568f2aa3b83fe7c539798d5d7ee706d47aa3089c1d666e6c

                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                        Filesize

                                                                                                                                        7KB

                                                                                                                                        MD5

                                                                                                                                        bd183606c020f4358efc9ed3e0ccf0e9

                                                                                                                                        SHA1

                                                                                                                                        c7576f888cd4bedc223021fe6dfe6d4f400640bf

                                                                                                                                        SHA256

                                                                                                                                        3221b9fdfc485ebdc58ae483b863f06446a6da0057149e136e44440e49729263

                                                                                                                                        SHA512

                                                                                                                                        2a4bf14fe71d837fb07c2d95ae9d42d690c67773d23616107ec61799837bcee6200d26645639b207adfb9f4b48243fa27f32141ffb227aefbe08de3010f8b293

                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                        Filesize

                                                                                                                                        6KB

                                                                                                                                        MD5

                                                                                                                                        ab2be18ed93db38a5ea7496325070cef

                                                                                                                                        SHA1

                                                                                                                                        1bef679bebae8023cc06eca3664b9fdf425b52a8

                                                                                                                                        SHA256

                                                                                                                                        02093c78bb06eea10999128f4d8a4237f70c1770979fd873646820d166b0b1d9

                                                                                                                                        SHA512

                                                                                                                                        73c6bc299ede0f4cce22a8e2462c8fb90346c8e745e1435e1068c222bbea483a4bc9f132c2ac559dee4ce3f9891c03e902bea1082285daf952e7cb6e4af7b100

                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                        Filesize

                                                                                                                                        6KB

                                                                                                                                        MD5

                                                                                                                                        63b72ee21ea684173b833c0bcda95ab4

                                                                                                                                        SHA1

                                                                                                                                        a6bb7a8ad211e9c7dd43c2db719beb461033d599

                                                                                                                                        SHA256

                                                                                                                                        168fc665de892456ca81be2e33ceacaf2681178282d63d93b45960244429eec8

                                                                                                                                        SHA512

                                                                                                                                        f0dbaca767e3e002dbf416d806c497fec6d79ede9c57bce3abcf206e5ce7a3e0bc8527be12f9ab829742d2ff2ee16a406a20ea00187f6d4db5bb78fa33c2f308

                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                        Filesize

                                                                                                                                        1KB

                                                                                                                                        MD5

                                                                                                                                        3e9e6934884c8e3a7a8c843d79b6819b

                                                                                                                                        SHA1

                                                                                                                                        8e107d91797cafaa16d54649cacfa16c73f6d1e4

                                                                                                                                        SHA256

                                                                                                                                        b74df57211fbf042e9d548bd6d18927784308f135429330ca5c2a8b4f5e1d059

                                                                                                                                        SHA512

                                                                                                                                        80976058b2f2e3c0c34dbddffa897226cfb4c64291f860f3da8798f12916870ce356097f12b511377c2bd897743a2f8b3423b26561d2b56b0058dacc70256749

                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                        Filesize

                                                                                                                                        1KB

                                                                                                                                        MD5

                                                                                                                                        76bef08ee24a02d4c8f1f3205779482d

                                                                                                                                        SHA1

                                                                                                                                        75877f5ca1db334bd142285c75a8ebd905a2c9ad

                                                                                                                                        SHA256

                                                                                                                                        9a9a008b4d6e131603f874f30d145f15cf3b6fd3a26b011ee43b85a9a89ffd60

                                                                                                                                        SHA512

                                                                                                                                        8f9b3bf652b0a8f94c44c4ea8171e7e1cd877d8c3ec9c3542e0d4d0ea0ebde1f4f6263b3ee59b72dfc431bf555c3223366309763f01c497e6de72036e75b3580

                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                        Filesize

                                                                                                                                        1KB

                                                                                                                                        MD5

                                                                                                                                        8d4926aa2091bde3bab0c95afbe7f49f

                                                                                                                                        SHA1

                                                                                                                                        fc18cef04ac7dfbbf78fdd59816e72b32598e3a5

                                                                                                                                        SHA256

                                                                                                                                        a9376805d2b15d098b1f5927d5521facfb687e7c471f6fc55e3d1a29697236a3

                                                                                                                                        SHA512

                                                                                                                                        4900ec80301e4c848e95e275b373d8a7e4b2e72529667728bb7c86725b162ed3decf656b67118d676c1e1848a5533d3a166916e3e16cd26b34c7fb91713e54e4

                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                        Filesize

                                                                                                                                        1KB

                                                                                                                                        MD5

                                                                                                                                        e270f8bcc541d0f526949fb05d856104

                                                                                                                                        SHA1

                                                                                                                                        cd98b20e5c5a5f2d61cf12f0a6c58d23f01baa53

                                                                                                                                        SHA256

                                                                                                                                        927ccd87c85d8d8ffb7c8a299d63f0a7f5f4d989266a28f754c90e5a08a80f47

                                                                                                                                        SHA512

                                                                                                                                        42cb86440b5a6573988006937e45aa6a1a28d584bf3d6d829b711cdb958cac065217932a6df72d11c90cfeecd1d7177bf0f6bf2fc6e921ce01df5d2da56137b2

                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                        Filesize

                                                                                                                                        1KB

                                                                                                                                        MD5

                                                                                                                                        eddcc655e6f88a41b88c6e798e1508ff

                                                                                                                                        SHA1

                                                                                                                                        ce9fc4b05483c9196e3e5b37571f2dc956735799

                                                                                                                                        SHA256

                                                                                                                                        a1b6d491c7dd7a6696cf59a2e5b680ae128dd01c2771af54062cb0593fa73442

                                                                                                                                        SHA512

                                                                                                                                        c551107ab98a7844a0a6615b1a1e9e4fca58f41accf3b2f5bbcfa61671250708f781dbf3bdd4064bab9a33518b5a8e87e03e5374838402fb6afc5b5a79215195

                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                        Filesize

                                                                                                                                        1KB

                                                                                                                                        MD5

                                                                                                                                        73e2ea9438f6371e07a2fb7133039f89

                                                                                                                                        SHA1

                                                                                                                                        e0e5fa0094526fbb5dcc6250b40ff988f1ccdf6e

                                                                                                                                        SHA256

                                                                                                                                        1198e018e95882064c6a2303b735765e7438cedc35f94e6731d032f8c15afbbe

                                                                                                                                        SHA512

                                                                                                                                        4743c3a6a8a2c788352c5bcfa7fc67f2091cc5be435dc9537e368d26d7b7b088af5e541511e6f4c1650081b2e6f5cececa903cbd3f79b542f4bcd79153b09221

                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                        Filesize

                                                                                                                                        1KB

                                                                                                                                        MD5

                                                                                                                                        0eb94c011390a8c634938fc4afb0b67b

                                                                                                                                        SHA1

                                                                                                                                        9e52291b817766aed50b76974052d578f36a3c50

                                                                                                                                        SHA256

                                                                                                                                        46a760e508926f216ba603faf0a7b35a33a0404f86bde5152befb06248ae25bc

                                                                                                                                        SHA512

                                                                                                                                        06026cb1ad671cec5c9f082372394ae9aed4b5344dfd28a852f4845af95c1d77ba915636e415ac7ba871b9d0f1f1864890a6e027fd2d8e875001237e3d0d0b99

                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                        Filesize

                                                                                                                                        1KB

                                                                                                                                        MD5

                                                                                                                                        0166e07d1d19702165aeaa3380fff936

                                                                                                                                        SHA1

                                                                                                                                        425281881beaf4f8aadd3b49f688273001d8e57c

                                                                                                                                        SHA256

                                                                                                                                        d272821d8491851e6a86b6e31a9603920e83b967486d163d619eaf58a40eeddd

                                                                                                                                        SHA512

                                                                                                                                        27849d0c95c087fe65800d2f932c064903202b5a76d7fabf8f409b93cdf3ef2c417edf5d62d2101952d6d5e0e5befb4aecb061dcf4752d4c9a63f19f2624088f

                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                        Filesize

                                                                                                                                        1KB

                                                                                                                                        MD5

                                                                                                                                        3e25d8b330d3521d378aed8cd015b64f

                                                                                                                                        SHA1

                                                                                                                                        c691215d2b200e0ca0cfd1f197e99fb87affdf31

                                                                                                                                        SHA256

                                                                                                                                        955c6eab02909127e035b5189083166eb5087275f7bea07f7652c649fe6b6e0e

                                                                                                                                        SHA512

                                                                                                                                        d3195812d06cc70cce7adf92ab4de2fd62847605798d66e0283c8bf908306f9cce33c938503d12aa5b7398b2f652453fb8e55211d69ffdaefc52365a03622a9a

                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                        Filesize

                                                                                                                                        1KB

                                                                                                                                        MD5

                                                                                                                                        c377b0ad68a865e9ee8ab45a42bf793e

                                                                                                                                        SHA1

                                                                                                                                        1f7ff2c702078817d5d2f68c0081ce4846870ac2

                                                                                                                                        SHA256

                                                                                                                                        521d6d80a9caf62b4b82c84389cb22402a12bfa7fb915039ac9b4cc7a7e3ed68

                                                                                                                                        SHA512

                                                                                                                                        88cac679f10498898840b57796616d051e593f028b425a43f12abeca70ffd1e9493c1d600afa18df0bb63f970a3269f22f8076e2ac4b67701d4c8225f5890596

                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe589af3.TMP

                                                                                                                                        Filesize

                                                                                                                                        538B

                                                                                                                                        MD5

                                                                                                                                        b6fd75c8d3bcf2b615ebfc15955948f1

                                                                                                                                        SHA1

                                                                                                                                        55a589a5c90cd1b35e0e6794cdb98eb10784d5ed

                                                                                                                                        SHA256

                                                                                                                                        21f5d514cfd5ee4e82cd544a11edb38af1275d08306b593c547aba7cba1b73a4

                                                                                                                                        SHA512

                                                                                                                                        a445163b3d686d2438d290c0b2765b95c0f1308e907fd116951e08f37f90edf44e82c508b9ee2b26fe33f10f2ba2e5f3ec835d053ecb5a26f2b67daa8d26ed09

                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                        Filesize

                                                                                                                                        16B

                                                                                                                                        MD5

                                                                                                                                        46295cac801e5d4857d09837238a6394

                                                                                                                                        SHA1

                                                                                                                                        44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                                                                        SHA256

                                                                                                                                        0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                                                                        SHA512

                                                                                                                                        8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                        Filesize

                                                                                                                                        16B

                                                                                                                                        MD5

                                                                                                                                        206702161f94c5cd39fadd03f4014d98

                                                                                                                                        SHA1

                                                                                                                                        bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                                                                                                        SHA256

                                                                                                                                        1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                                                                                                        SHA512

                                                                                                                                        0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                        Filesize

                                                                                                                                        12KB

                                                                                                                                        MD5

                                                                                                                                        87b86566c33daed0361b3688a4571b12

                                                                                                                                        SHA1

                                                                                                                                        1645872fefbc2adeda3f5a8e08db8936ef62eeca

                                                                                                                                        SHA256

                                                                                                                                        13f6913bfb23896677d85215c53766db7fb4a0bb6cfd880bdf149c5ad85c5f67

                                                                                                                                        SHA512

                                                                                                                                        9b51589ad221a48090549ba93343d4d7245564c713fb7e4070768cb8d74adefe68ad3e4da7427b2a08078496865b63292779c95d83ce1cc6d3f172c613689300

                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                        Filesize

                                                                                                                                        12KB

                                                                                                                                        MD5

                                                                                                                                        c7bedd81643551ae82f0dd4cc65ae0c1

                                                                                                                                        SHA1

                                                                                                                                        c6e82510ff8be6261b122067893cc36fb8f8ad48

                                                                                                                                        SHA256

                                                                                                                                        796e4110d1994b7fb50416ab401ccd659306a8d1c633217dea4ea729a1d4db1d

                                                                                                                                        SHA512

                                                                                                                                        b044962dadb17932c18dc594d31ccb5e0c902ec3be396abad83d69c2159164c9e3f3bb8da01e9cfb5c5124ed65ac7fd9e09c149216cb9636a046704fe36365ae

                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                        Filesize

                                                                                                                                        12KB

                                                                                                                                        MD5

                                                                                                                                        eaafa61f8be42bda27ece5a78b00a1a6

                                                                                                                                        SHA1

                                                                                                                                        31fd2aad76e498a3cfac99b01f8c0cad72e56710

                                                                                                                                        SHA256

                                                                                                                                        643d7fb8668bce42f7d9ac322fb2696d24f79244c27787a33c8a541b371e0fb3

                                                                                                                                        SHA512

                                                                                                                                        b1b0299468a684e57c066c30b637e98ed21519caec6eb6bb7a60ec2c7b7970e3fb01ab501aaded22410fb5951c6b38a2048f16c7bc3abb0eddabcc444311ed73

                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                        Filesize

                                                                                                                                        11KB

                                                                                                                                        MD5

                                                                                                                                        9137b24b3681d3496d3693b1df826f14

                                                                                                                                        SHA1

                                                                                                                                        28d5bb57c4f208ec567378c3fadf767471aafc7e

                                                                                                                                        SHA256

                                                                                                                                        7701f24395e2fd2b40eaff450903c09ad9c989cdbee9bb6a149abd2f7f880c28

                                                                                                                                        SHA512

                                                                                                                                        3c855f4ac9eaf05887d782fa0419dc12de3f74efac794b263b9c17c06732f1b3accd0fba92ab664f126690df2817140c763a723c1951e9e7a87effa1c033e300

                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                        Filesize

                                                                                                                                        12KB

                                                                                                                                        MD5

                                                                                                                                        362664369cb9973a4415368eb146a8e4

                                                                                                                                        SHA1

                                                                                                                                        36b1d8efe0a524c8a577df67fd06a82cb2ee9beb

                                                                                                                                        SHA256

                                                                                                                                        39bd3f7c0550dbfb3ae2d4d40a12ff36e1b116c71e31b7bca0286d45b55ecc88

                                                                                                                                        SHA512

                                                                                                                                        d3904911253415627bc1fd6314be5ce4b263eaafdd7da8b100d581bd742b2c08457588ff2b522f421b99a92ca6e6ccd281ff3fbc9f2fff77801758630469d8f3

                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_R_E_A_D___T_H_I_S___3ZITWHA5_.hta

                                                                                                                                        Filesize

                                                                                                                                        75KB

                                                                                                                                        MD5

                                                                                                                                        c82d3cb52c8ba621dc66a386abe97b59

                                                                                                                                        SHA1

                                                                                                                                        d4a178c3cef34af370dd0c430c403a618000c246

                                                                                                                                        SHA256

                                                                                                                                        0bf4e3090d7d80966d4de255e196924f337e3c2c41d8e2f77670a13396ca1fed

                                                                                                                                        SHA512

                                                                                                                                        fb7b8ce256fc0d3d982d884b41be221333d4558031e75ee2f8458a799d3b92ab612ad5a3a77b5a67df075ce7bbce78f2c222e4f0a8357baeb855753da7eb0816

                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_R_E_A_D___T_H_I_S___5PRH6JJ_.txt

                                                                                                                                        Filesize

                                                                                                                                        1KB

                                                                                                                                        MD5

                                                                                                                                        adfdfeb6ddc465802b5e7aa57f7626f0

                                                                                                                                        SHA1

                                                                                                                                        07a4c6ebbc313b5c4bdcdbc71fdbfedcac9c2c9d

                                                                                                                                        SHA256

                                                                                                                                        6c45f9cb2ae6ce992c3346a234e0e34b267363d43da085a216d312b06a6553ae

                                                                                                                                        SHA512

                                                                                                                                        2cfa8eef30a4650e1b056d967f2828330890020fa5941ec31d938d6f7568c1b604326cb9063a9804b79bda684e6991438ae7399a5751f76929aec37a0a2b127b

                                                                                                                                      • C:\Users\Admin\Downloads\Unconfirmed 163364.crdownload

                                                                                                                                        Filesize

                                                                                                                                        315KB

                                                                                                                                        MD5

                                                                                                                                        9f8bc96c96d43ecb69f883388d228754

                                                                                                                                        SHA1

                                                                                                                                        61ed25a706afa2f6684bb4d64f69c5fb29d20953

                                                                                                                                        SHA256

                                                                                                                                        7d373ccb96d1dbb1856ef31afa87c2112a0c1795a796ab01cb154700288afec5

                                                                                                                                        SHA512

                                                                                                                                        550a891c1059f58aa983138caf65a7ea9c326cb1b94c15f3e7594128f6e9f1295b9c2dbc0925637dba7c94e938083fffc6a63dc7c2e5b1e247679931cce505c6

                                                                                                                                      • C:\Users\Admin\Downloads\Unconfirmed 163364.crdownload:SmartScreen

                                                                                                                                        Filesize

                                                                                                                                        7B

                                                                                                                                        MD5

                                                                                                                                        4047530ecbc0170039e76fe1657bdb01

                                                                                                                                        SHA1

                                                                                                                                        32db7d5e662ebccdd1d71de285f907e3a1c68ac5

                                                                                                                                        SHA256

                                                                                                                                        82254025d1b98d60044d3aeb7c56eed7c61c07c3e30534d6e05dab9d6c326750

                                                                                                                                        SHA512

                                                                                                                                        8f002af3f4ed2b3dfb4ed8273318d160152da50ee4842c9f5d9915f50a3e643952494699c4258e6af993dc6e1695d0dc3db6d23f4d93c26b0bc6a20f4b4f336e

                                                                                                                                      • C:\Users\Admin\Downloads\Unconfirmed 689399.crdownload

                                                                                                                                        Filesize

                                                                                                                                        532KB

                                                                                                                                        MD5

                                                                                                                                        00add4a97311b2b8b6264674335caab6

                                                                                                                                        SHA1

                                                                                                                                        3688de985909cc9f9fa6e0a4f2e43d986fe6d0ec

                                                                                                                                        SHA256

                                                                                                                                        812af0ec9e1dfd8f48b47fd148bafe6eecb42d0a304bc0e4539750dd23820a7f

                                                                                                                                        SHA512

                                                                                                                                        aaf5dae929e6b5809b77b6a79ab833e548b66fb628afeb20b554d678947494a6804cb3d59bf6bbcb2b14cede1a0609aa41f8e7fe8a7999d578e8b7af7144cb70

                                                                                                                                      • C:\Users\Admin\Downloads\Unconfirmed 728937.crdownload

                                                                                                                                        Filesize

                                                                                                                                        141KB

                                                                                                                                        MD5

                                                                                                                                        de8d08a3018dfe8fd04ed525d30bb612

                                                                                                                                        SHA1

                                                                                                                                        a65d97c20e777d04fb4f3c465b82e8c456edba24

                                                                                                                                        SHA256

                                                                                                                                        2ae0c4a5f1fedf964e2f8a486bf0ee5d1816aac30c889458a9ac113d13b50ceb

                                                                                                                                        SHA512

                                                                                                                                        cc4bbf71024732addda3a30a511ce33ce41cbed2d507dfc7391e8367ddf9a5c4906a57bf8310e3f6535646f6d365835c7e49b95584d1114faf2738dcb1eb451a

                                                                                                                                      • C:\Users\Admin\Downloads\Unconfirmed 83457.crdownload

                                                                                                                                        Filesize

                                                                                                                                        1.1MB

                                                                                                                                        MD5

                                                                                                                                        0d3d77a419d673cf0a1991a1637db8a3

                                                                                                                                        SHA1

                                                                                                                                        e66fa82a521309dcf20e6156be843e7106bc42f6

                                                                                                                                        SHA256

                                                                                                                                        a56b702149310f2932cbc55481c2e44e30c622ddf7153a9e94582db5fdcdcc48

                                                                                                                                        SHA512

                                                                                                                                        7ccadbef7def2e71e170d60a3a7def2eeafd7e56978f1d523f36b5ca9ee992bff814e91f871c066cbd3452f633ea31c45b081c941752087890176c9cc6d16bfc

                                                                                                                                      • C:\Users\Admin\Downloads\Unconfirmed 939758.crdownload

                                                                                                                                        Filesize

                                                                                                                                        313KB

                                                                                                                                        MD5

                                                                                                                                        fe1bc60a95b2c2d77cd5d232296a7fa4

                                                                                                                                        SHA1

                                                                                                                                        c07dfdea8da2da5bad036e7c2f5d37582e1cf684

                                                                                                                                        SHA256

                                                                                                                                        b3e1e9d97d74c416c2a30dd11858789af5554cf2de62f577c13944a19623777d

                                                                                                                                        SHA512

                                                                                                                                        266c541a421878e1e175db5d94185c991cec5825a4bc50178f57264f3556080e6fe984ed0380acf022ce659aa1ca46c9a5e97efc25ff46cbfd67b9385fd75f89

                                                                                                                                      • memory/464-871-0x0000000010000000-0x0000000010030000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        192KB

                                                                                                                                      • memory/464-880-0x0000000010000000-0x0000000010030000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        192KB

                                                                                                                                      • memory/696-866-0x0000000010000000-0x0000000010030000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        192KB

                                                                                                                                      • memory/696-868-0x0000000010000000-0x0000000010030000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        192KB

                                                                                                                                      • memory/1168-819-0x00000000000E0000-0x0000000000155000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        468KB

                                                                                                                                      • memory/1168-817-0x0000000010000000-0x0000000010030000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        192KB

                                                                                                                                      • memory/1168-821-0x0000000010000000-0x0000000010030000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        192KB

                                                                                                                                      • memory/1168-894-0x0000000010000000-0x0000000010030000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        192KB

                                                                                                                                      • memory/1168-897-0x0000000010000000-0x0000000010030000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        192KB

                                                                                                                                      • memory/1572-1005-0x0000000000400000-0x0000000000433000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        204KB

                                                                                                                                      • memory/1572-1032-0x0000000000400000-0x0000000000433000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        204KB

                                                                                                                                      • memory/1572-596-0x0000000001000000-0x0000000001026000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        152KB

                                                                                                                                      • memory/1572-1443-0x0000000000400000-0x0000000000433000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        204KB

                                                                                                                                      • memory/1572-618-0x0000000001000000-0x0000000001026000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        152KB

                                                                                                                                      • memory/1572-1413-0x0000000000400000-0x0000000000433000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        204KB

                                                                                                                                      • memory/1572-1400-0x0000000000400000-0x0000000000433000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        204KB

                                                                                                                                      • memory/2128-874-0x0000000010000000-0x0000000010030000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        192KB

                                                                                                                                      • memory/2128-883-0x0000000010000000-0x0000000010030000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        192KB

                                                                                                                                      • memory/3672-877-0x0000000010000000-0x0000000010030000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        192KB

                                                                                                                                      • memory/3672-889-0x0000000010000000-0x0000000010030000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        192KB

                                                                                                                                      • memory/3676-903-0x0000000010000000-0x0000000010030000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        192KB

                                                                                                                                      • memory/3676-901-0x0000000000E90000-0x0000000000F05000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        468KB

                                                                                                                                      • memory/3676-900-0x0000000010000000-0x0000000010030000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        192KB

                                                                                                                                      • memory/3804-1001-0x0000000000440000-0x000000000044E000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        56KB

                                                                                                                                      • memory/3872-827-0x0000000010000000-0x0000000010030000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        192KB

                                                                                                                                      • memory/3872-826-0x0000000000E90000-0x0000000000F05000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        468KB

                                                                                                                                      • memory/3872-825-0x0000000010000000-0x0000000010030000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        192KB

                                                                                                                                      • memory/4104-914-0x0000000010000000-0x0000000010030000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        192KB

                                                                                                                                      • memory/4104-912-0x0000000010000000-0x0000000010030000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        192KB

                                                                                                                                      • memory/4332-891-0x0000000010000000-0x0000000010030000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        192KB

                                                                                                                                      • memory/4332-886-0x0000000010000000-0x0000000010030000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        192KB

                                                                                                                                      • memory/4460-909-0x0000000010000000-0x0000000010030000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        192KB

                                                                                                                                      • memory/4460-906-0x0000000010000000-0x0000000010030000-memory.dmp

                                                                                                                                        Filesize

                                                                                                                                        192KB