Analysis

  • max time kernel
    1053s
  • max time network
    1053s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-08-2024 08:39

General

  • Target

    malware-generator.html

  • Size

    15KB

  • MD5

    0faf0617c59a8ec8197965fbc7141fd7

  • SHA1

    5e3b32c5194b8c841c004f94e75c8266d5fdfaff

  • SHA256

    372d8835dfab3841b96d433a446e6480a6b885d4a7c03b57681c09443c824ab1

  • SHA512

    1ac07c4cd248e87a4ef31fa97bda4dabe3225b07bb3acbfe1719d516f21b45a217e4f6e94a199449bd06fec57deeb6db754da290abeb4dbaff19176213b11f9e

  • SSDEEP

    192:PNxyShvK9moqTJkNrv23pyR5vku2RDU5avRFVH9r4gMNmqnjyv2ooa4ryJN:yShi9boJkNzUI8/7vtl4gEGeowON

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_R_E_A_D___T_H_I_S___A5ED_.hta

Family

cerber

Ransom Note
<!DOCTYPE html> <html lang="en"> <head> <meta charset="utf-8"> <title>C&#069;&#82;BE&#82; &#82;ANSOMWA&#82;&#069;: Instructi&#111;ns</title> <HTA:APPLICATION APPLICATIONNAME="82xh" SCROLL="yes" SINGLEINSTANCE="yes" WINDOWSTATE="maximize"> <style type="text/css"> a { color: #04a; text-decoration: none; } a:hover { text-decoration: underline; } body { background-color: #e7e7e7; color: #222; font-family: "Lucida Sans Unicode", "Lucida Grande", sans-serif; font-size: 13pt; line-height: 19pt; } body, h1 { margin: 0; padding: 0; } hr { color: #bda; height: 2pt; margin: 1.5%; } h1 { color: #555; font-size: 14pt; } ol { padding-left: 2.5%; } ol li { padding-bottom: 13pt; } small { color: #555; font-size: 11pt; } ul { list-style-type: none; margin: 0; padding: 0; } .button { color: #04a; cursor: pointer; } .button:hover { text-decoration: underline; } .container { background-color: #fff; border: 2pt solid #c7c7c7; margin: 5%; min-width: 850px; padding: 2.5%; } .header { border-bottom: 2pt solid #c7c7c7; margin-bottom: 2.5%; padding-bottom: 2.5%; } .h { display: none; } .hr { background: #bda; display: block; height: 2pt; margin-top: 1.5%; margin-bottom: 1.5%; overflow: hidden; width: 100%; } .info { background-color: #efe; border: 2pt solid #bda; display: inline-block; padding: 1.5%; text-align: center; } .updating { color: red; display: none; padding-left: 35px; background: url("data:image/gif;base64,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") left no-repeat; } #change_language { float: right; } #change_language, #texts div { display: none; } </style> </head> <body> <div class="container"> <div class="header"> <a id="change_language" href="#" onclick="return changeLanguage1();" title="English">&#9745; English</a> <h1>C&#069;&#82;BE&#82; &#82;ANSOMWA&#82;&#069;</h1> <small id="title">Instructions</small> </div> <div id="languages"> <p>&#9745; Select your language</p> <ul> <li><a href="#" title="English" onclick="return sh_bl('en');">English</a></li> <li><a href="#" title="Arabic" onclick="return sh_bl('ar');">العربية</a></li> <li><a href="#" title="Chinese" onclick="return sh_bl('zh');">中文</a></li> <li><a href="#" title="Dutch" onclick="return sh_bl('nl');">Nederlands</a></li> <li><a href="#" title="French" onclick="return sh_bl('fr');">Français</a></li> <li><a href="#" title="German" onclick="return sh_bl('de');">Deutsch</a></li> <li><a href="#" title="Italian" onclick="return sh_bl('it');">Italiano</a></li> <li><a href="#" title="Japanese" onclick="return sh_bl('ja');">日本語</a></li> <li><a href="#" title="Korean" onclick="return sh_bl('ko');">한국어</a></li> <li><a href="#" title="Polish" onclick="return sh_bl('pl');">Polski</a></li> <li><a href="#" title="Portuguese" onclick="return sh_bl('pt');">Português</a></li> <li><a href="#" title="Spanish" onclick="return sh_bl('es');">Español</a></li> <li><a href="#" title="Turkish" onclick="return sh_bl('tr');">Türkçe</a></li> </ul> </div> <div id="texts"> <div id="en"> <p>Can't yo<span class="h">0kwE</span>u find the necessary files?<br>Is the c<span class="h">SRM1RPU</span>ontent of your files not readable?</p> <p>It is normal be<span class="h">VQgly9a</span>cause the files' names and the data in your files have been encryp<span class="h">eKOkNxey</span>ted by "Ce<span class="h">8Wm</span>r&#98;er&nbsp;Rans&#111;mware".</p> <p>It me<span class="h">KVoA</span>ans your files are NOT damage<span class="h">dN</span>d! Your files are modified only. This modification is reversible.<br>F<span class="h">rYSQU</span>rom now it is not poss<span class="h">XI8</span>ible to use your files until they will be decrypted.</p> <p>The only way to dec<span class="h">6eZ</span>rypt your files safely is to &#98;uy the special decryption software "C<span class="h">B0J2L7qq</span>er&#98;er&nbsp;Decryptor".</p> <p>Any attempts to rest<span class="h">SL8R7gA6</span>ore your files with the thir<span class="h">daxMICcV4F</span>d-party software will be fatal for your files!</p> <hr> <p class="w331208">You can proc<span class="h">OMJ</span>eed with purchasing of the decryption softw<span class="h">Ez2TuYzgmt</span>are at your personal page:</p> <p><span class="info"><span class="updating">Ple<span class="h">baq</span>ase wait...</span><a class="url" href="http://p27dokhpz2n7nvgr.12hygy.top/A914-D543-3A64-0446-9AF6" target="_blank">http://p27dokhpz2n7nvgr.12hygy.top/A914-D543-3A64-0446-9AF6</a><hr><a href="http://p27dokhpz2n7nvgr.14ewqv.top/A914-D543-3A64-0446-9AF6" target="_blank">http://p27dokhpz2n7nvgr.14ewqv.top/A914-D543-3A64-0446-9AF6</a><hr><a href="http://p27dokhpz2n7nvgr.14vvrc.top/A914-D543-3A64-0446-9AF6" target="_blank">http://p27dokhpz2n7nvgr.14vvrc.top/A914-D543-3A64-0446-9AF6</a><hr><a href="http://p27dokhpz2n7nvgr.129p1t.top/A914-D543-3A64-0446-9AF6" target="_blank">http://p27dokhpz2n7nvgr.129p1t.top/A914-D543-3A64-0446-9AF6</a><hr><a href="http://p27dokhpz2n7nvgr.1apgrn.top/A914-D543-3A64-0446-9AF6" target="_blank">http://p27dokhpz2n7nvgr.1apgrn.top/A914-D543-3A64-0446-9AF6</a></span></p> <p>If t<span class="h">O0gT</span>his page cannot be opened &nbsp;<span class="button" onclick="return _url_upd_('en');">cli<span class="h">BhyxM9I</span>ck here</span>&nbsp; to get a new addr<span class="h">MQ</span>ess of your personal page.<br><br>If the addre<span class="h">JdA1t3s</span>ss of your personal page is the same as befo<span class="h">28G</span>re after you tried to get a new one,<br>you c<span class="h">QzEIZa4Tg</span>an try to get a new address in one hour.</p> <p>At th<span class="h">8Sm</span>is p&#097;ge you will receive the complete instr<span class="h">wc</span>uctions how to buy the decrypti<span class="h">9eroineg</span>on software for restoring all your files.</p> <p>Also at this p&#097;ge you will be able to res<span class="h">Hz1gEJ</span>tore any one file for free to be sure "Cer&#98;e<span class="h">lvJYDcaDp</span>r&nbsp;Decryptor" will help you.</p> <hr> <p>If your per<span class="h">MKUQD</span>sonal page is not availa<span class="h">udXRAZ</span>ble for a long period there is another way to open your personal page - insta<span class="h">KDOMOgE</span>llation and use of Tor&nbsp;Browser:</p> <ol> <li>run your Inte<span class="h">DvnWyjs</span>rnet browser (if you do not know wh&#097;t it is run the Internet&nbsp;Explorer);</li> <li>ent<span class="h">N</span>er or copy the &#097;ddress <a href="https://www.torproject.org/download/download-easy.html.en" target="_blank">https://www.torproject.org/downlo&#097;d/download-easy.html.en</a> into the address bar of your browser &#097;nd press ENTER;</li> <li>wait for the site load<span class="h">empVqQ5</span>ing;</li> <li>on the site you will be offered to do<span class="h">gTPBdLyDy</span>wnload Tor&nbsp;Browser; download and run it, follow the installation instructions, wait until the installation is completed;</li> <li>ru<span class="h">O00izRM</span>n Tor&nbsp;Browser;</li> <li>connect with the butt<span class="h">r</span>on "Connect" (if you use the English version);</li> <li>a normal Internet bro<span class="h">w56Co</span>wser window will be opened &#097;fter the initialization;</li> <li>type or copy the add<span class="h">JXczkLHX8</span>ress <br><span class="info">http://p27dokhpz2n7nvgr.onion/A914-D543-3A64-0446-9AF6</span><br> in this browser address bar;</li> <li>pre<span class="h">q7AEReYe</span>ss ENTER;</li> <li>the site sho<span class="h">M</span>uld be loaded; if for some reason the site is not lo<span class="h">VRK</span>ading wait for a moment and try again.</li> </ol> <p>If you have any pr<span class="h">ow76u25fA</span>oblems during installation or use of Tor&nbsp;Browser, please, visit <a href="https://www.youtube.com/results?search_query=Install+Tor+Browser+Windows" target="_blank">https://www.youtube.com</a> and type request in the searc<span class="h">igwcFs</span>h bar "Install Tor&nbsp;Browser Windows" and you will find a lot of training videos about Tor&nbsp;Browser installation and use.</p> <hr> <p><strong>Addit<span class="h">tREFG</span>ional information:</strong></p> <p>You will fi<span class="h">jVwcO</span>nd the instru<span class="h">SCS</span>cti&#111;ns ("*_READ_THIS_FILE_*.hta") for re<span class="h">fYIJeJmlk</span>st&#111;ring y&#111;ur files in &#097;ny f<span class="h">UF7yqUN</span>&#111;lder with your enc<span class="h">5tijKkLN9B</span>rypted files.</p> <p>The instr<span class="h">Lm</span>ucti&#111;ns "*_READ_THIS_FILE_*.hta" in the f<span class="h">87OIw612lS</span>&#111;lder<span class="h">XK2v</span>s with your encry<span class="h">BPH2C4P56</span>pted files are not vir<span class="h">LwQhfndfL</span>uses! The instruc<span class="h">x</span>tions "*_READ_THIS_FILE_*.hta" will he<span class="h">UC</span>lp you to dec<span class="h">3</span>rypt your files.</p> <p>Remembe<span class="h">WYQL</span>r! The w&#111;rst si<span class="h">It0J</span>tu&#097;tion already happ<span class="h">GXbio</span>ened and n&#111;w the future of your files de<span class="h">4iCMDAo7Ws</span>pends on your determ<span class="h">pmc</span>ination and speed of your actions.</p> </div> <div id="ar" style="direction: rtl;"> <p>لا يمكنك العثور على الملفات الضرورية؟<br>هل محتوى الملفات غير قابل للقراءة؟</p> <p>هذا أمر طبيعي لأن أسماء الملفات والبيانات في الملفات قد تم تشفيرها بواسطة "Cer&#98;er&nbsp;Rans&#111;mware".</p> <p>وهذا يعني أن الملفات الخاصة بك ليست تالفة! فقد تم تعديل ملفاتك فقط. ويمكن التراجع عن هذا.<br>ومن الآن فإنه لا يكن استخدام الملفات الخاصة بك حتى يتم فك تشفيرها.</p> <p>الطريقة الوحيدة لفك تشفير ملفاتك بأمان هو أن تشتري برنامج فك التشفير المتخصص "Cer&#98;er&nbsp;Decryptor".</p> <p>إن أية محاولات لاستعادة الملفات الخاصة بك بواسطة برامج من طرف ثالث سوف تكون مدمرة لملفاتك!</p> <hr> <p>يمكنك الشروع في شراء برنامج فك التشفير من صفحتك الشخصية:</p> <p><span class="info"><span class="updating">أرجو الإنتظار...</span><a class="url" href="http://p27dokhpz2n7nvgr.12hygy.top/A914-D543-3A64-0446-9AF6" target="_blank">http://p27dokhpz2n7nvgr.12hygy.top/A914-D543-3A64-0446-9AF6</a><hr><a href="http://p27dokhpz2n7nvgr.14ewqv.top/A914-D543-3A64-0446-9AF6" target="_blank">http://p27dokhpz2n7nvgr.14ewqv.top/A914-D543-3A64-0446-9AF6</a><hr><a href="http://p27dokhpz2n7nvgr.14vvrc.top/A914-D543-3A64-0446-9AF6" target="_blank">http://p27dokhpz2n7nvgr.14vvrc.top/A914-D543-3A64-0446-9AF6</a><hr><a href="http://p27dokhpz2n7nvgr.129p1t.top/A914-D543-3A64-0446-9AF6" target="_blank">http://p27dokhpz2n7nvgr.129p1t.top/A914-D543-3A64-0446-9AF6</a><hr><a href="http://p27dokhpz2n7nvgr.1apgrn.top/A914-D543-3A64-0446-9AF6" target="_blank">http://p27dokhpz2n7nvgr.1apgrn.top/A914-D543-3A64-0446-9AF6</a></span></p> <p>في حالة تعذر فتح هذه الصفحة &nbsp;<span class="button" onclick="return _url_upd_('ar');">انقر هنا</span>&nbsp; لإنشاء عنوان جديد لصفحتك الشخصية.</p> <p>في هذه الصفحة سوف تتلقى تعليمات كاملة حول كيفية شراء برنامج فك التشفير لاستعادة جميع الملفات الخاصة بك.</p> <p>في هذه الصفحة أيضًا سوف تتمكن من استعادة ملف واحد بشكل مجاني للتأكد من أن "Cer&#98;er&nbsp;Decryptor" سوف يساعدك.</p> <hr> <p>إذا كانت صفحتك الشخصية غير متاحة لفترة طويلة فإن ثمّة طريقة أخرى لفتح صفحتك الشخصية - تحميل واستخدام متصفح Tor:</p> <ol> <li>قم بتشغيل متصفح الإنترنت الخاص بك (إذا كنت لا تعرف ما هو قم بتشغيل إنترنت إكسبلورر);</li> <li>قم بكتابة أو نسخ العنوان <a href="https://www.torproject.org/download/download-easy.html.en" target="_blank">https://www.torproject.org/download/download-easy.html.en</a> إلى شريط العنوان في المستعرض الخاص بك ثم اضغط ENTER;</li> <li>انتظر لتحميل الموقع;</li> <li>سوف يعرض عليك الموقع تحميل متصفح Tor. قم بتحميله وتشغيله، واتبع تعليمات التثبيت، وانتظر حتى اكتمال التثبيت;</li> <li>قم بتشغيل متصفح Tor;</li> <li>اضغط على الزر "Connect" (إذا كنت تستخدم النسخة الإنجليزية);</li> <li>سوف تُفتح نافذة متصفح الإنترنت العادي بعد البدء;</li> <li>قم بكتابة أو نسخ العنوان <br><span class="info">http://p27dokhpz2n7nvgr.onion/A914-D543-3A64-0446-9AF6</span><br> في شريط العنوان في المتصفح;</li> <li>اضغط ENTER;</li> <li>يجب أن يتم تحميل الموقع؛ إذا لم يتم تحميل الموقع لأي سبب، انتظر للحظة وحاول مرة أخرى.</li> </ol> <p>إذا كان لديك أية مشكلات أثناء عملية التثبيت أو استخدام متصفح Tor، يُرجى زيارة <a href="https://www.youtube.com/results?search_query=Install+Tor+Browser+Windows" target="_blank">https://www.youtube.com</a> واكتب الطلب "install tor browser windows" أو "تثبيت نوافذ متصفح Tor" في شريط البحث، وسوف تجد الكثير من أشرطة الفيديو للتدريب حول تثبيت متصفح Tor واستخدامه.</p> <hr> <p><strong>معلومات إض<span class="h">70wHLsYE</span>افية:</strong></p> <p>س<span class="h">kJQCyX</span>وف تجد إرشادات استعادة الملفات الخاصة بك ("*_READ_THIS_FILE_*") في أي مجلد مع ملفاتك المشفرة.</p> <p>الإرش<span class="h">Mx9C67XaN</span>ادات ("*_READ_THIS_FILE_*") الموجودة في المجلدات مع ملفاتك المشفرة ليست فيروسات والإرشادات ("*_READ_THIS_FILE_*") سوف تساعدك على فك تشفير الملفات الخاصة بك.</p> <p>تذكر أن أسوأ مو<span class="h">bJf5RAH1S3</span>قف قد حدث بالفعل، والآن مستقبل ملفاتك يعتمد على عزيمتك وسرعة الإجراءات الخاصة بك.</p> </div> <div id="zh"> <p>您找不到所需的文件?<br>您文件的内容无法阅读?</p> <p>这是正常的,因为您文件的文件名和数据已经被“Cer&#98;er&nbsp;Rans&#111;mware”加密了。</p> <p>这意味着您的文件并没有损坏!您的文件只是被��

Extracted

Path

C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_R_E_A_D___T_H_I_S___IGXACSYQ_.txt

Family

cerber

Ransom Note
CERBER RANSOMWARE ----- YOUR DOCUMENTS, PH0TOS, DATABASES AND OTHER IMPORTANT FILES HAVE BEEN ENCRYPTED! ----- The only way to decrypt y0ur files is to receive the private key and decryption program. To receive the private key and decryption program go to any decrypted folder, inside there is the special file (*_READ_THIS_FILE_*) with complete instructions how to decrypt your files. If you cannot find any (*_READ_THIS_FILE_*) file at your PC, follow the instructions below: ----- 1. Download "Tor Browser" from https://www.torproject.org/ and install it. 2. In the "Tor Browser" open your personal page here: http://p27dokhpz2n7nvgr.onion/A914-D543-3A64-0446-9AF6 Note! This page is available via "Tor Browser" only. ----- Also you can use temporary addresses on your personal page without using "Tor Browser". ----- 1. http://p27dokhpz2n7nvgr.12hygy.top/A914-D543-3A64-0446-9AF6 2. http://p27dokhpz2n7nvgr.14ewqv.top/A914-D543-3A64-0446-9AF6 3. http://p27dokhpz2n7nvgr.14vvrc.top/A914-D543-3A64-0446-9AF6 4. http://p27dokhpz2n7nvgr.129p1t.top/A914-D543-3A64-0446-9AF6 5. http://p27dokhpz2n7nvgr.1apgrn.top/A914-D543-3A64-0446-9AF6 ----- Note! These are temporary addresses! They will be available for a limited amount of time! -----
URLs

http://p27dokhpz2n7nvgr.onion/A914-D543-3A64-0446-9AF6

http://p27dokhpz2n7nvgr.12hygy.top/A914-D543-3A64-0446-9AF6

http://p27dokhpz2n7nvgr.14ewqv.top/A914-D543-3A64-0446-9AF6

http://p27dokhpz2n7nvgr.14vvrc.top/A914-D543-3A64-0446-9AF6

http://p27dokhpz2n7nvgr.129p1t.top/A914-D543-3A64-0446-9AF6

http://p27dokhpz2n7nvgr.1apgrn.top/A914-D543-3A64-0446-9AF6

Signatures

  • Cerber

    Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.

  • Contacts a large (1218) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Drops startup file 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Drops file in System32 directory 38 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 20 IoCs
  • Drops file in Windows directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 29 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 18 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 9 IoCs
  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 34 IoCs
  • Opens file in notepad (likely ransom note) 3 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 3 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 26 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\malware-generator.html
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4224
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffd2a9f46f8,0x7ffd2a9f4708,0x7ffd2a9f4718
      2⤵
        PID:2032
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:2
        2⤵
          PID:1924
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1180
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:8
          2⤵
            PID:2044
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:1
            2⤵
              PID:1776
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:1
              2⤵
                PID:4480
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4960 /prefetch:8
                2⤵
                  PID:4488
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4960 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4732
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:1
                  2⤵
                    PID:4960
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:1
                    2⤵
                      PID:212
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:1
                      2⤵
                        PID:1684
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:1
                        2⤵
                          PID:4076
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:1
                          2⤵
                            PID:388
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:1
                            2⤵
                              PID:3432
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3976 /prefetch:1
                              2⤵
                                PID:804
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:1
                                2⤵
                                  PID:3228
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:1
                                  2⤵
                                    PID:836
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2480 /prefetch:1
                                    2⤵
                                      PID:4924
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6060 /prefetch:1
                                      2⤵
                                        PID:1596
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6160 /prefetch:1
                                        2⤵
                                          PID:2896
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6308 /prefetch:1
                                          2⤵
                                            PID:3700
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6364 /prefetch:1
                                            2⤵
                                              PID:4644
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6664 /prefetch:1
                                              2⤵
                                                PID:3012
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6100 /prefetch:1
                                                2⤵
                                                  PID:3600
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6228 /prefetch:1
                                                  2⤵
                                                    PID:5024
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6624 /prefetch:1
                                                    2⤵
                                                      PID:3272
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7116 /prefetch:1
                                                      2⤵
                                                        PID:1892
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6968 /prefetch:1
                                                        2⤵
                                                          PID:3752
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7248 /prefetch:1
                                                          2⤵
                                                            PID:2112
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7588 /prefetch:1
                                                            2⤵
                                                              PID:1752
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7776 /prefetch:1
                                                              2⤵
                                                                PID:3552
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7612 /prefetch:1
                                                                2⤵
                                                                  PID:3148
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7936 /prefetch:1
                                                                  2⤵
                                                                    PID:3352
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8048 /prefetch:1
                                                                    2⤵
                                                                      PID:2936
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8496 /prefetch:1
                                                                      2⤵
                                                                        PID:3520
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=7620 /prefetch:2
                                                                        2⤵
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        PID:5472
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7920 /prefetch:1
                                                                        2⤵
                                                                          PID:5744
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7928 /prefetch:1
                                                                          2⤵
                                                                            PID:5884
                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8848 /prefetch:1
                                                                            2⤵
                                                                              PID:5264
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7748 /prefetch:1
                                                                              2⤵
                                                                                PID:4352
                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:1
                                                                                2⤵
                                                                                  PID:5020
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8112 /prefetch:1
                                                                                  2⤵
                                                                                    PID:5340
                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8088 /prefetch:1
                                                                                    2⤵
                                                                                      PID:5316
                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:1
                                                                                      2⤵
                                                                                        PID:5616
                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=44 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6104 /prefetch:1
                                                                                        2⤵
                                                                                          PID:5624
                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=45 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6628 /prefetch:1
                                                                                          2⤵
                                                                                            PID:5804
                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=46 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:1
                                                                                            2⤵
                                                                                              PID:6028
                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=7024 /prefetch:8
                                                                                              2⤵
                                                                                                PID:5468
                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=7520 /prefetch:8
                                                                                                2⤵
                                                                                                • Modifies registry class
                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                PID:2768
                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=49 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6628 /prefetch:1
                                                                                                2⤵
                                                                                                  PID:3116
                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=50 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7224 /prefetch:1
                                                                                                  2⤵
                                                                                                    PID:4648
                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=51 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8072 /prefetch:1
                                                                                                    2⤵
                                                                                                      PID:3288
                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=52 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:1
                                                                                                      2⤵
                                                                                                        PID:1136
                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=53 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8680 /prefetch:1
                                                                                                        2⤵
                                                                                                          PID:3788
                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=54 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:1
                                                                                                          2⤵
                                                                                                            PID:6108
                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=55 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2856 /prefetch:1
                                                                                                            2⤵
                                                                                                              PID:3924
                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=56 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:1
                                                                                                              2⤵
                                                                                                                PID:5480
                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=57 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:1
                                                                                                                2⤵
                                                                                                                  PID:5528
                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=58 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:1
                                                                                                                  2⤵
                                                                                                                    PID:1612
                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=59 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1832 /prefetch:1
                                                                                                                    2⤵
                                                                                                                      PID:3124
                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,11869842085241046358,6397442243624917580,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=60 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7004 /prefetch:1
                                                                                                                      2⤵
                                                                                                                        PID:5360
                                                                                                                    • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                      1⤵
                                                                                                                        PID:2908
                                                                                                                      • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                        1⤵
                                                                                                                          PID:1680
                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default
                                                                                                                          1⤵
                                                                                                                          • Enumerates system info in registry
                                                                                                                          • Modifies registry class
                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                                                                          • Suspicious use of FindShellTrayWindow
                                                                                                                          • Suspicious use of SendNotifyMessage
                                                                                                                          PID:4792
                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffd2a9f46f8,0x7ffd2a9f4708,0x7ffd2a9f4718
                                                                                                                            2⤵
                                                                                                                              PID:336
                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,2550614393557082428,17987554677188670478,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:2
                                                                                                                              2⤵
                                                                                                                                PID:2708
                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,2550614393557082428,17987554677188670478,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2540 /prefetch:3
                                                                                                                                2⤵
                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                PID:1100
                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,2550614393557082428,17987554677188670478,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:8
                                                                                                                                2⤵
                                                                                                                                  PID:2460
                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,2550614393557082428,17987554677188670478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:1
                                                                                                                                  2⤵
                                                                                                                                    PID:760
                                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,2550614393557082428,17987554677188670478,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:1
                                                                                                                                    2⤵
                                                                                                                                      PID:1800
                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,2550614393557082428,17987554677188670478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:1
                                                                                                                                      2⤵
                                                                                                                                        PID:5404
                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2084,2550614393557082428,17987554677188670478,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3512 /prefetch:8
                                                                                                                                        2⤵
                                                                                                                                          PID:5948
                                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2084,2550614393557082428,17987554677188670478,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=3548 /prefetch:8
                                                                                                                                          2⤵
                                                                                                                                          • Modifies registry class
                                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                                          PID:4232
                                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,2550614393557082428,17987554677188670478,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5624 /prefetch:8
                                                                                                                                          2⤵
                                                                                                                                            PID:540
                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,2550614393557082428,17987554677188670478,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5624 /prefetch:8
                                                                                                                                            2⤵
                                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                                            PID:1776
                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,2550614393557082428,17987554677188670478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:1
                                                                                                                                            2⤵
                                                                                                                                              PID:4992
                                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,2550614393557082428,17987554677188670478,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:1
                                                                                                                                              2⤵
                                                                                                                                                PID:3592
                                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,2550614393557082428,17987554677188670478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:1
                                                                                                                                                2⤵
                                                                                                                                                  PID:3152
                                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,2550614393557082428,17987554677188670478,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:1
                                                                                                                                                  2⤵
                                                                                                                                                    PID:2124
                                                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,2550614393557082428,17987554677188670478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:1
                                                                                                                                                    2⤵
                                                                                                                                                      PID:6008
                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,2550614393557082428,17987554677188670478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:1
                                                                                                                                                      2⤵
                                                                                                                                                        PID:2264
                                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,2550614393557082428,17987554677188670478,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2032 /prefetch:1
                                                                                                                                                        2⤵
                                                                                                                                                          PID:2756
                                                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2084,2550614393557082428,17987554677188670478,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4108 /prefetch:8
                                                                                                                                                          2⤵
                                                                                                                                                            PID:5448
                                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2084,2550614393557082428,17987554677188670478,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6620 /prefetch:8
                                                                                                                                                            2⤵
                                                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                            PID:1084
                                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,2550614393557082428,17987554677188670478,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6316 /prefetch:2
                                                                                                                                                            2⤵
                                                                                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                            PID:3684
                                                                                                                                                        • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                          1⤵
                                                                                                                                                            PID:3868
                                                                                                                                                          • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                            1⤵
                                                                                                                                                              PID:3252
                                                                                                                                                            • C:\Windows\System32\rundll32.exe
                                                                                                                                                              C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                                                                                                              1⤵
                                                                                                                                                                PID:5036
                                                                                                                                                              • C:\Windows\system32\OpenWith.exe
                                                                                                                                                                C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                                1⤵
                                                                                                                                                                • Modifies registry class
                                                                                                                                                                • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                                                PID:2484
                                                                                                                                                                • C:\Windows\system32\NOTEPAD.EXE
                                                                                                                                                                  "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware-Samples-main.zip\Ransomware-Samples-main\README.md
                                                                                                                                                                  2⤵
                                                                                                                                                                    PID:2416
                                                                                                                                                                • C:\Windows\system32\OpenWith.exe
                                                                                                                                                                  C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                                  1⤵
                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                                                                                  PID:5528
                                                                                                                                                                  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
                                                                                                                                                                    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Downloads\Ransomware-Samples-main\Ransomware-Samples-main\Cryptowall\Ransomware.Cryptowall\cryptowall.bin"
                                                                                                                                                                    2⤵
                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                    • Checks processor information in registry
                                                                                                                                                                    • Modifies Internet Explorer settings
                                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                                    PID:5976
                                                                                                                                                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                                                                                                                                      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
                                                                                                                                                                      3⤵
                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                      PID:1196
                                                                                                                                                                      • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                                                                                                                                        "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E443473485A7A40C794274E5D60BAEA1 --mojo-platform-channel-handle=1728 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                                                                                                                                                                        4⤵
                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                        PID:4636
                                                                                                                                                                      • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                                                                                                                                        "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=09DB0C1FBAFBECD2CFFF97AFC9F6046E --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=09DB0C1FBAFBECD2CFFF97AFC9F6046E --renderer-client-id=2 --mojo-platform-channel-handle=1760 --allow-no-sandbox-job /prefetch:1
                                                                                                                                                                        4⤵
                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                        PID:6000
                                                                                                                                                                      • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                                                                                                                                        "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=40E9CE86D26926C9C7FDAFC9B28714F9 --mojo-platform-channel-handle=2152 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                                                                                                                                                                        4⤵
                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                        PID:5772
                                                                                                                                                                      • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                                                                                                                                        "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=2BA226005F4FD618C285C334D3EB0729 --mojo-platform-channel-handle=2420 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                                                                                                                                                                        4⤵
                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                        PID:5036
                                                                                                                                                                      • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                                                                                                                                        "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=6C6F14CA4FD79FADD4094C8E715CA023 --mojo-platform-channel-handle=2340 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                                                                                                                                                                        4⤵
                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                        PID:3208
                                                                                                                                                                • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                                  1⤵
                                                                                                                                                                    PID:2988
                                                                                                                                                                  • C:\Windows\system32\OpenWith.exe
                                                                                                                                                                    C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                                    1⤵
                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                    • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                                    PID:5172
                                                                                                                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "C:\Users\Admin\Downloads\Ransomware-Samples-main\Ransomware-Samples-main\Rex\Ransomware.Rex\WTEpZSFwgb"
                                                                                                                                                                      2⤵
                                                                                                                                                                        PID:2548
                                                                                                                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url C:\Users\Admin\Downloads\Ransomware-Samples-main\Ransomware-Samples-main\Rex\Ransomware.Rex\WTEpZSFwgb
                                                                                                                                                                          3⤵
                                                                                                                                                                          • Checks processor information in registry
                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                          • Suspicious use of SendNotifyMessage
                                                                                                                                                                          PID:4244
                                                                                                                                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2000 -parentBuildID 20240401114208 -prefsHandle 1928 -prefMapHandle 1920 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {79ea77e2-948f-4c8b-9bc8-34b22192da5b} 4244 "\\.\pipe\gecko-crash-server-pipe.4244" gpu
                                                                                                                                                                            4⤵
                                                                                                                                                                              PID:4320
                                                                                                                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2412 -prefMapHandle 2400 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bd56bdce-9a80-43ef-95d9-ad86bbb8194c} 4244 "\\.\pipe\gecko-crash-server-pipe.4244" socket
                                                                                                                                                                              4⤵
                                                                                                                                                                              • Checks processor information in registry
                                                                                                                                                                              PID:5348
                                                                                                                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3068 -childID 1 -isForBrowser -prefsHandle 3060 -prefMapHandle 2744 -prefsLen 24741 -prefMapSize 244658 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8a5a3b21-c457-40ef-994d-7c690924ba13} 4244 "\\.\pipe\gecko-crash-server-pipe.4244" tab
                                                                                                                                                                              4⤵
                                                                                                                                                                                PID:1868
                                                                                                                                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1256 -childID 2 -isForBrowser -prefsHandle 3724 -prefMapHandle 3752 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9c3e978a-596a-49de-add2-46c054b6acbf} 4244 "\\.\pipe\gecko-crash-server-pipe.4244" tab
                                                                                                                                                                                4⤵
                                                                                                                                                                                  PID:4356
                                                                                                                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4948 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4856 -prefMapHandle 4968 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5563f47f-ec13-4024-ab1f-d8e879671979} 4244 "\\.\pipe\gecko-crash-server-pipe.4244" utility
                                                                                                                                                                                  4⤵
                                                                                                                                                                                  • Checks processor information in registry
                                                                                                                                                                                  PID:1256
                                                                                                                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5136 -childID 3 -isForBrowser -prefsHandle 5316 -prefMapHandle 5312 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f138e044-d29c-49c2-9fc7-506d6da71c76} 4244 "\\.\pipe\gecko-crash-server-pipe.4244" tab
                                                                                                                                                                                  4⤵
                                                                                                                                                                                    PID:5876
                                                                                                                                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5520 -childID 4 -isForBrowser -prefsHandle 5516 -prefMapHandle 5324 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a6065f67-e525-47ca-b96f-a0d8e5fb404e} 4244 "\\.\pipe\gecko-crash-server-pipe.4244" tab
                                                                                                                                                                                    4⤵
                                                                                                                                                                                      PID:4412
                                                                                                                                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5692 -childID 5 -isForBrowser -prefsHandle 5316 -prefMapHandle 5428 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1260 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {dcf5b474-76e5-4aae-aba0-f8714579f68d} 4244 "\\.\pipe\gecko-crash-server-pipe.4244" tab
                                                                                                                                                                                      4⤵
                                                                                                                                                                                        PID:2584
                                                                                                                                                                                • C:\Windows\system32\OpenWith.exe
                                                                                                                                                                                  C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                                                  1⤵
                                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                                  PID:5716
                                                                                                                                                                                  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
                                                                                                                                                                                    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Downloads\WTEpZSFwgb"
                                                                                                                                                                                    2⤵
                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                    • Checks processor information in registry
                                                                                                                                                                                    • Modifies Internet Explorer settings
                                                                                                                                                                                    PID:3208
                                                                                                                                                                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                                                                                                                                                      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
                                                                                                                                                                                      3⤵
                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                      PID:6040
                                                                                                                                                                                      • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                                                                                                                                                        "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=8A0662AB4A0DAEBF0D197ECD07C513CF --mojo-platform-channel-handle=1724 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                                                                                                                                                                                        4⤵
                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                        PID:3756
                                                                                                                                                                                      • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                                                                                                                                                        "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=1561F44054D276C561D1249BE974C2E4 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=1561F44054D276C561D1249BE974C2E4 --renderer-client-id=2 --mojo-platform-channel-handle=1748 --allow-no-sandbox-job /prefetch:1
                                                                                                                                                                                        4⤵
                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                        PID:3100
                                                                                                                                                                                      • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                                                                                                                                                        "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=D30D71CC3331802842E5169508EB27B3 --mojo-platform-channel-handle=2288 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                                                                                                                                                                                        4⤵
                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                        PID:4480
                                                                                                                                                                                      • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                                                                                                                                                        "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=A0E5E07B651EA147CFB228BE734ECF26 --mojo-platform-channel-handle=1796 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                                                                                                                                                                                        4⤵
                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                        PID:5228
                                                                                                                                                                                      • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                                                                                                                                                        "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=E23255913F31AA94545A19FF3E85B214 --mojo-platform-channel-handle=1712 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                                                                                                                                                                                        4⤵
                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                        PID:5408
                                                                                                                                                                                • C:\Windows\system32\OpenWith.exe
                                                                                                                                                                                  C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                                                  1⤵
                                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                                  PID:1708
                                                                                                                                                                                • C:\Windows\system32\OpenWith.exe
                                                                                                                                                                                  C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                                                  1⤵
                                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                                  PID:1148
                                                                                                                                                                                • C:\Windows\system32\OpenWith.exe
                                                                                                                                                                                  C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                                                  1⤵
                                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                                  PID:4448
                                                                                                                                                                                  • C:\Windows\system32\NOTEPAD.EXE
                                                                                                                                                                                    "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.Jigsaw.zip\jigsaw
                                                                                                                                                                                    2⤵
                                                                                                                                                                                    • Opens file in notepad (likely ransom note)
                                                                                                                                                                                    PID:5820
                                                                                                                                                                                • C:\Windows\system32\NOTEPAD.EXE
                                                                                                                                                                                  "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Ransomware-Samples-main\Ransomware-Samples-main\README.md
                                                                                                                                                                                  1⤵
                                                                                                                                                                                    PID:3324
                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.Cerber.zip\cerber.exe
                                                                                                                                                                                    "C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.Cerber.zip\cerber.exe"
                                                                                                                                                                                    1⤵
                                                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                                                    • Sets desktop wallpaper using registry
                                                                                                                                                                                    • Drops file in Program Files directory
                                                                                                                                                                                    • Drops file in Windows directory
                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                    PID:2248
                                                                                                                                                                                    • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                                                      C:\Windows\system32\netsh.exe advfirewall set allprofiles state on
                                                                                                                                                                                      2⤵
                                                                                                                                                                                      • Modifies Windows Firewall
                                                                                                                                                                                      • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                      PID:1856
                                                                                                                                                                                    • C:\Windows\SysWOW64\netsh.exe
                                                                                                                                                                                      C:\Windows\system32\netsh.exe advfirewall reset
                                                                                                                                                                                      2⤵
                                                                                                                                                                                      • Modifies Windows Firewall
                                                                                                                                                                                      • Event Triggered Execution: Netsh Helper DLL
                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                      PID:420
                                                                                                                                                                                    • C:\Windows\SysWOW64\mshta.exe
                                                                                                                                                                                      "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___MH7K6YD_.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
                                                                                                                                                                                      2⤵
                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                      PID:5256
                                                                                                                                                                                    • C:\Windows\SysWOW64\NOTEPAD.EXE
                                                                                                                                                                                      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\_R_E_A_D___T_H_I_S___WJN1_.txt
                                                                                                                                                                                      2⤵
                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                      • Opens file in notepad (likely ransom note)
                                                                                                                                                                                      PID:2580
                                                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                      "C:\Windows\system32\cmd.exe"
                                                                                                                                                                                      2⤵
                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                      PID:2632
                                                                                                                                                                                      • C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                        taskkill /f /im "cerber.exe"
                                                                                                                                                                                        3⤵
                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                        • Kills process with taskkill
                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                        PID:1584
                                                                                                                                                                                      • C:\Windows\SysWOW64\PING.EXE
                                                                                                                                                                                        ping -n 1 127.0.0.1
                                                                                                                                                                                        3⤵
                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                        • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                                                                                        • Runs ping.exe
                                                                                                                                                                                        PID:552
                                                                                                                                                                                  • C:\Users\Admin\Downloads\Ransomware-Samples-main\Ransomware-Samples-main\Cerber\Ransomware.Cerber\cerber.exe
                                                                                                                                                                                    "C:\Users\Admin\Downloads\Ransomware-Samples-main\Ransomware-Samples-main\Cerber\Ransomware.Cerber\cerber.exe"
                                                                                                                                                                                    1⤵
                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                    PID:5816
                                                                                                                                                                                  • C:\Windows\system32\OpenWith.exe
                                                                                                                                                                                    C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                                                    1⤵
                                                                                                                                                                                    • Modifies registry class
                                                                                                                                                                                    PID:3684
                                                                                                                                                                                  • C:\Windows\SysWOW64\mshta.exe
                                                                                                                                                                                    "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Documents\_R_E_A_D___T_H_I_S___JBT0_.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
                                                                                                                                                                                    1⤵
                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                    PID:1020
                                                                                                                                                                                  • C:\Windows\system32\NOTEPAD.EXE
                                                                                                                                                                                    "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Documents\_R_E_A_D___T_H_I_S___VLHY25_.txt
                                                                                                                                                                                    1⤵
                                                                                                                                                                                    • Opens file in notepad (likely ransom note)
                                                                                                                                                                                    PID:4336
                                                                                                                                                                                  • C:\Users\Admin\Downloads\Ransomware-Samples-main\Ransomware-Samples-main\Mamba\Ransomware.Mamba\131.exe
                                                                                                                                                                                    "C:\Users\Admin\Downloads\Ransomware-Samples-main\Ransomware-Samples-main\Mamba\Ransomware.Mamba\131.exe"
                                                                                                                                                                                    1⤵
                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                    PID:5152
                                                                                                                                                                                  • C:\Users\Admin\Downloads\Ransomware-Samples-main\Ransomware-Samples-main\Mamba\Ransomware.Mamba\131.exe
                                                                                                                                                                                    "C:\Users\Admin\Downloads\Ransomware-Samples-main\Ransomware-Samples-main\Mamba\Ransomware.Mamba\131.exe"
                                                                                                                                                                                    1⤵
                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                    PID:4044
                                                                                                                                                                                  • C:\Users\Admin\Downloads\Ransomware-Samples-main\Ransomware-Samples-main\Mamba\Ransomware.Mamba\131.exe
                                                                                                                                                                                    "C:\Users\Admin\Downloads\Ransomware-Samples-main\Ransomware-Samples-main\Mamba\Ransomware.Mamba\131.exe"
                                                                                                                                                                                    1⤵
                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                    PID:5740
                                                                                                                                                                                  • C:\Users\Admin\Downloads\Ransomware-Samples-main\Ransomware-Samples-main\Mamba\Ransomware.Mamba\131.exe
                                                                                                                                                                                    "C:\Users\Admin\Downloads\Ransomware-Samples-main\Ransomware-Samples-main\Mamba\Ransomware.Mamba\131.exe"
                                                                                                                                                                                    1⤵
                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                    PID:5500
                                                                                                                                                                                  • C:\Users\Admin\Downloads\Ransomware-Samples-main\Ransomware-Samples-main\Mamba\Ransomware.Mamba\131.exe
                                                                                                                                                                                    "C:\Users\Admin\Downloads\Ransomware-Samples-main\Ransomware-Samples-main\Mamba\Ransomware.Mamba\131.exe"
                                                                                                                                                                                    1⤵
                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                    PID:2744
                                                                                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default
                                                                                                                                                                                    1⤵
                                                                                                                                                                                    • Enumerates system info in registry
                                                                                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                                                                                                                                    PID:4384
                                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd2a9f46f8,0x7ffd2a9f4708,0x7ffd2a9f4718
                                                                                                                                                                                      2⤵
                                                                                                                                                                                        PID:3908
                                                                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1956,14076380234344063917,15230671027979641356,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:2
                                                                                                                                                                                        2⤵
                                                                                                                                                                                          PID:3276
                                                                                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1956,14076380234344063917,15230671027979641356,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2360 /prefetch:3
                                                                                                                                                                                          2⤵
                                                                                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                          PID:5972
                                                                                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1956,14076380234344063917,15230671027979641356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:8
                                                                                                                                                                                          2⤵
                                                                                                                                                                                            PID:5748
                                                                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,14076380234344063917,15230671027979641356,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:1
                                                                                                                                                                                            2⤵
                                                                                                                                                                                              PID:5804
                                                                                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,14076380234344063917,15230671027979641356,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:1
                                                                                                                                                                                              2⤵
                                                                                                                                                                                                PID:5588
                                                                                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,14076380234344063917,15230671027979641356,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:1
                                                                                                                                                                                                2⤵
                                                                                                                                                                                                  PID:5528
                                                                                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,14076380234344063917,15230671027979641356,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4500 /prefetch:1
                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                    PID:4280
                                                                                                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                                                                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1956,14076380234344063917,15230671027979641356,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5088 /prefetch:8
                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                      PID:1444
                                                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                                                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1956,14076380234344063917,15230671027979641356,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5088 /prefetch:8
                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                      PID:4376
                                                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,14076380234344063917,15230671027979641356,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1792 /prefetch:1
                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                        PID:3188
                                                                                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,14076380234344063917,15230671027979641356,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1264 /prefetch:1
                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                          PID:1848
                                                                                                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1956,14076380234344063917,15230671027979641356,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:1
                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                            PID:4328
                                                                                                                                                                                                        • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                                                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                            PID:5392
                                                                                                                                                                                                          • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                                                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                              PID:6112
                                                                                                                                                                                                            • C:\Users\Admin\Downloads\Ransomware-Samples-main\Ransomware-Samples-main\Petrwrap\Ransomware.Petrwrap\svchost.exe
                                                                                                                                                                                                              "C:\Users\Admin\Downloads\Ransomware-Samples-main\Ransomware-Samples-main\Petrwrap\Ransomware.Petrwrap\svchost.exe"
                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                              • Drops startup file
                                                                                                                                                                                                              • Drops desktop.ini file(s)
                                                                                                                                                                                                              • Drops file in Windows directory
                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                              PID:1740
                                                                                                                                                                                                            • C:\Users\Admin\Downloads\Ransomware-Samples-main\Ransomware-Samples-main\Petrwrap\Ransomware.Petrwrap\svchost.exe
                                                                                                                                                                                                              "C:\Users\Admin\Downloads\Ransomware-Samples-main\Ransomware-Samples-main\Petrwrap\Ransomware.Petrwrap\svchost.exe"
                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                              PID:2764
                                                                                                                                                                                                            • C:\Users\Admin\Downloads\Ransomware-Samples-main\Ransomware-Samples-main\Petrwrap\Ransomware.Petrwrap\svchost.exe
                                                                                                                                                                                                              "C:\Users\Admin\Downloads\Ransomware-Samples-main\Ransomware-Samples-main\Petrwrap\Ransomware.Petrwrap\svchost.exe"
                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                              PID:5096
                                                                                                                                                                                                            • C:\Users\Admin\Downloads\Ransomware-Samples-main\Ransomware-Samples-main\Petrwrap\Ransomware.Petrwrap\svchost.exe
                                                                                                                                                                                                              "C:\Users\Admin\Downloads\Ransomware-Samples-main\Ransomware-Samples-main\Petrwrap\Ransomware.Petrwrap\svchost.exe"
                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                              PID:5476
                                                                                                                                                                                                            • C:\Windows\system32\taskmgr.exe
                                                                                                                                                                                                              "C:\Windows\system32\taskmgr.exe" /4
                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                              • Checks SCSI registry key(s)
                                                                                                                                                                                                              • Checks processor information in registry
                                                                                                                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                              • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                              PID:1592

                                                                                                                                                                                                            Network

                                                                                                                                                                                                            MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                            Replay Monitor

                                                                                                                                                                                                            Loading Replay Monitor...

                                                                                                                                                                                                            Downloads

                                                                                                                                                                                                            • C:\Users\Admin\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\Cache\data_1

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              264KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              fe3399b79dd33e9c353eaf9f06c20253

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              2d1982aa59b8667bfe0285225db5fedac3bdd496

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              62fefc38c244485a73b965765a0c623ed4355a3da47451504b5bf8551354aa12

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              82d769ac1e8b3de4fd2eeac4c0a0339b788bcd47b6f2e9d6f9af75ad5f9b6bc1a403f83f7ac4b0e219dab294aa083c3057ab6254a652a22679ceceb786e372ba

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              152B

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              f9664c896e19205022c094d725f820b6

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              f8f1baf648df755ba64b412d512446baf88c0184

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              7121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              3fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              152B

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              6eb3c4c4439da1e9eb0fd4a54accf4e0

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              2fd9b13d7dd9c9a8dafec034b58d7415a7af5fd7

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              29f344d6ed142ba2d9d0acc2bdb69c10b21dc2eebb4d8ed55395cca358d83b60

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              bc6701c95a302dec0d1a569d3128381b82dea5478dca465c3e2397eab18212c9941a3cc936599f7539f0a914af78f265af769c0728b656de22bcdabd2b64e0c0

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              152B

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              847d47008dbea51cb1732d54861ba9c9

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              f2099242027dccb88d6f05760b57f7c89d926c0d

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              10292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              152B

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              3000a0ff8ffbbc34b9480fc96b9284ef

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              dcf297abe33d48bf9eaf2efdc82feb1b8ec8eeea

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              16576ec8777581e57e751d5cb3d9a130b131ed2f4cc8b7221224f61eb7533fdb

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              0363630d899ce4461a7d6c9ae62115efe449cc0f7bb3549c0a360af20eb214b37ccb791df535aba571dd167838347981e7d85ee2f5e9d3a78fabfa0945cf056b

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              152B

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              72f1d4b6a108d07ae3fafb9d42a31b41

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              8ed84ec22b598d3a1f30d33c39788792ba378a65

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              0a41a87524b41448c2cb4d0d2b0bf4334827a0c7601eee0152d45c3d85469401

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              4e0c52ebd13d294841b446936c27599a534a4cb11c05e7aa3ffa183bd79f415ec4ebb0d0076c31239ac09c01b5fe32cbf9a18ea0c90c419761834161befbaecd

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\353325bf-e1f8-4fef-9ec8-3253531f48c7.tmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              11KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              ab27beb4bdb889d97094a78a96c223f1

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              cff0f33b37bc8b467ffcd9dac83eb5ad30be477c

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              4b9f41198e59320151db07bf4b3c9c34686286d1ffe37e1c373e0bb4213d1382

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              e3e5808f57f3e1fc78cc9246bb7307d36ef08c4ba631b08e7f12b01c2b9b4715fb73b2239470af0ed9a47e419149b4ca874f6dba0520d27a10580dafa1791cd4

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\51b6b15f-c9e5-4c58-8eeb-fadf0d79367d.tmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              1B

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              5058f1af8388633f609cadb75a75dc9d

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00001f

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              210KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              48d2860dd3168b6f06a4f27c6791bcaa

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              f5f803efed91cd45a36c3d6acdffaaf0e863bf8c

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              04d7bf7a6586ef00516bdb3f7b96c65e0b9c6b940f4b145121ed00f6116bbb77

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              172da615b5b97a0c17f80ddd8d7406e278cd26afd1eb45a052cde0cb55b92febe49773b1e02cf9e9adca2f34abbaa6d7b83eaad4e08c828ef4bf26f23b95584e

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000030

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              159KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              efffddb08b71b543e4919e27c00e4ad7

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              5c1d67100366d28f0b20c9c77e8e93474a3a9869

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              fd413f7c851c5275bd3115bb010c54558d29f0b7e19d68d9d2200fe1709c4619

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              b04963330742865faaea910f9a7be22b32d2357d0db4768dee719f4c1296ca54de267571a88d3eb6f7415f576cf2c659dd76a545998ccd8ccb4175dbdadccb43

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              5KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              aeeaf6c0e216f69f4ec328fcf94e1ecf

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              89ab8fa6955ee58f27bdac88f17b23e71ed6538c

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              ba4683f4e55ffd7004df27e05ce0da645608474ab21864168f11526ef129d764

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              1c4f1fbbc53d585c3b6371a4d7ad1fda60486d1581e04fb621ffbd943e484bd01334a282bdc03b1b573f68e32632bd8015dd5c1a914e995336b2ef0c29ad43c7

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              2KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              ae0957274c7d2ca1f63336e26f6f16aa

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              f07b863397880ff2b721d8a44617222b8f7ab6e3

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              1015075726573d5dd20bd22686b339bf8ff9c2f1dafed6462c0a219c46369984

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              1613675e2f0a70ef898fa850702a86a32f3dbbfefd199e1a587b1c744012ba16910fd108e54049fd00f1c3c6afe023261ffa3957f1941191fe8cd0214e441e26

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              864B

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              0a4dcc54b06f1e1c2f645fc63692995a

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              2e4018cc8f058e46d459b5d6ec3c873bc4560827

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              70fcb090024eef30e7b8d0c03557ed5dadcb5f9dc40aa51118154e4a6cd0f353

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              faa25da240770e0b47ee7734d0b34f0139a2b73bbc988e18b5142bb6cee08744c79cc1e87dff6ecde06ef4c0a55358221d1b4b98bbfed49fc26b92807d05e357

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              6KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              bd5d264227dd7893ba4ffc9a67e8b7a4

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              b65a1f127c51d249a0641334b082e6ffe21af853

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              2b41c51ca89e5d7b86a7eb9f8f6eaaffc7994fb4af13c2798acb0eaa9eeac176

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              aee58f9c59052f9ccc9a7a3683c43185b33b33fe18de0d1e47a21062b0d87016dea0b0faf64cb6a47a815385247f2fe93af9df90cf2f384947aded5ab1dba5f4

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              111B

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              807419ca9a4734feaf8d8563a003b048

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              a723c7d60a65886ffa068711f1e900ccc85922a6

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              8KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              e6a4686d4413daa4424f67528c9e0e7d

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              641949ca606d81faaad835b9521a37c298494e29

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              4a7d7e552b59e9477eab1531bfb6c72c2183c24cc8c9647ec1548f8b6faad3a6

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              7a4b3c5913f660580fa901b585be80a2ab910e24d423d4382c0c48c4152bb294cfa302757ea2ca38fe2b9f5aa0b369569d498884a33aaba9491af8f8671a16db

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              111B

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              285252a2f6327d41eab203dc2f402c67

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              9KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              b8e36b54b12b1e0803295ca2414e318c

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              9b0c7620269fe9acd2483c273ff5cc620953c417

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              586e5c5f0fb75b0b2a9ca2356e495b2a5c7300fe84583e9323225553575b6883

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              461e0159a1c82f2f0eeb42d24ac2ed43786d01ec4dc37b89558f68234cc836623565ca5d95eec3e437970a0cfedbf7d3e66bd262995e3b74ed8c5b9ca4ee1760

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              8KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              1bd941fdbe07ebe1c0b198e91d0f31c5

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              33e266a5c5abbb4276cfb4054e09c4481a1bf12f

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              debcb9d85db843ef71bc2c38d8aa3633137f4839e65b04bfd16c8fbe1b4851ab

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              02a8e77fa5cc63c4bb16f188cab588a35ba25414cf2a7dd22c64dfc50dd55a2f6f6dddf941bbf9b184800fe70bbf7b34596caf269386fdd1516939b348c4b655

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              6KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              12aebd530f0b4574edd44ab82d5eb70c

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              8ff0c24c7250b6f5818a99266decd9d655276c2a

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              f2d2ac8fccab0cae29a8327e9098cb7c0b283c6a1a4f2ed6a6a9dda573444552

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              e689a303a15e0e1b3a62ba7ebeece6879bd9b3bcfdb53682ec1610594dac2df5d8c85cfbd45d1e52729f02d4011004d4bc68c1418af3b1fc6df89289a6177a74

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              6KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              137eb181e6a1655fee42234cbbab6df5

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              5328b4e3da116c0f5b609441d15c0c3f8d7b6202

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              e78b2a3b02f88fd1f6bafd9769fc955fa1f06ee1ba5eaeb4a6dba072e29b42df

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              38ddbe51b4344daf566eaddc587f406e5a1262dd7f298d01497d3f685ae151a625213b38ae2cbaa3243de0fb7dd1b1b726dc794759d8b870e1b0360787d74998

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              13KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              b120a704aa0343ef135d2fd8c4d0d2a6

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              b194996bb930e6cc74a53db61bcdccfa91bf309b

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              2f9e0dfe3638ab79f0c5ba981188bcafce1b6010182153e92e584b957b4bf0e3

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              9f313ac6c485a4e617ec3b8437d33a4dc9e721b459e662c71c89d622fda669f10abf62b82c3e16585e7349ba3e6c376eb6a3deac51f4a5c051405c23eaab0124

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              13KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              491c09c3ae099573382d0154eab22a24

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              8211c53974f7cedfa58ebf6ba781cc9d422b6754

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              7fd5293f05f3728801aadfa2e8cfca743bba5aee3591983d3c3aad4410818267

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              c42fa10fb6e9fd8cd318135b3ea18a11b8a1a8bbbe50528dc2123c7de1cfe71b325f899a0378444ebf04ff9eda578d61607def2b670c1ac880a9b8e63d25d3c0

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              13KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              6d11fda40296c4e1e9c33c0d15c74012

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              149f7017eede456af1a694d69c2cda5eed656815

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              4723f1702bdc3ff94c56d69c702194fd06ab73242420e63258b91f61793dca66

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              28e7ffc3f37fe78a0a8b1640f44109192bcff93f8190b3f4c370ceccdfac009ed8a4f940aefc7de698e19401934af7ef472f0da58023258ec4f1175cba206230

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              13KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              e756282757688fdba45c5e6639c9030b

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              b68c84d75996329630dfb2678eb13160904ef5e8

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              670eb0e83b11a831098a01b28b90c60a3c7c5066da9bd7070d71220318631c31

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              1b8d409b0616a29da79bba57019090c6e592032b7ed9e3e771ef14dcc3a89b3101571f032b9af96469c1083cc14b58d654e888014fe1d68cc3e9dd54abdd6618

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              6KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              85e8d9fb630cb4faf9ab7313483c49ff

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              469243070ab7cd22ebfd86cff9a0747a82f117da

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              f93326f75ea4001bc253996cfaa8ef63ed6f546e00fa9a4d70755aa438477211

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              39be45b54bdbccd4ed2852a7bc39384876edaed1ca1b17750016d9264f41f61c554461953b3ef794f1108bc911d46c455fe34926c86f939dcf10c052629a3d82

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              13KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              52f9ed193599d3a166902b43f7f4521a

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              ac81d2a40a9f7279e8dad688e4322b5a534b59a4

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              67c2bda1fdab3e8301df07660c10fd2ce2a1229b13e59403b7b8ac471779ae35

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              780c8d6b8e83f2072eea7d55606effe0d8a0a45ab5a19a7af9e65223dd71a23194efe2fbb245e4d7fc100e4fd3952c993cd67c844eb893c000d7f85a5eca4556

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              12KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              e3b8881a6846b917c804dcec2ceb4a2b

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              2803f2bdef72914169b162f751f9c2b9b77265e7

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              81463a0ebe1d7d0c557d2ea311ed9c0e031e807d563ca760bbec764289888789

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              50f05b386e9ce8f7e70c9600063f3ecd11246d5eb0e30538b3f983ccdda3fb2618fdd7a14bc41aeaae344b3cce10bc8c5ac91187ea868235e376f40fb2ef0421

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              13KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              1aa44744550b5843802ec06d28e118e7

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              81f5478044313614757a449c38d96c9fa8ae4b48

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              dbbec7cad0d7873217c637fab6e8af99417e4c334c73c649e3fe4ad30fbd230e

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              a7cd02043d47cd03be67841328d47dd9092172c74fb5d109bb0fb56b5e9aebc44505d893601d85020782c775e3d771087655dc81a9114fcbc5d77f40986b0986

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              13KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              062d0584762cb548a17d429412090a7c

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              6a2235f0dc8a66054f91de132d368ecac8a2fb3d

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              760ba353c4ddf5eb241f5427348d5ba43bec0e23cb628d957f4bdf738f6c7cd6

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              7f471297891a8ac0c2b659bd50d3c5004c52a2f56b00d3ffc55eaa80cf76f828eceeec373ed772b3c3ba2c7f1a9dd016910e0e776925cda2ce76a014fe584f59

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              13KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              b12c075f70fa697961c9511c2a47ef5e

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              60f5f2ded45fe6122ab9ce3e0f11b49c84711da8

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              a4fd6d19509073ba249d0247d3e0ad5f3a88835aa8a59a45db43ce11afb166b4

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              5cf9feda7558f70629c40a442d2cf35fa8cacd21ef942b47498685bc24b3f00430c4d95d732624afa2c281a3d3f4ea3415168c1c0ecfcb2c920890c24fc816b8

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              13KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              0ead8ba7fe52875ce9906fda2919c817

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              02a1223b5903ea69e857a5d213293f85ae1661a6

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              9b5bba9c14f55bdc61c0378e821fc54ce6d096f9a9f0fbc49a578bf053f7aa2b

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              706776f78e6abdc74813f227327cf1cec24d54add4865fb950f9d0acf3e35cc9408a2d7c07f255f152b1e9e0ac750af68b3fca985085ecc6cdd8529108a4bc80

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              13KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              0cdb9d8f8b279d0fcc2e4bcfa7c13ace

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              a7c728db7f10221be0ab6d95caa5aff0a981d28c

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              564e842196b20fd5c20291d11ce293ba94165c1c9c57222049e600fec18e50cf

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              6417d01bf34a2153a781d13614fb10fc68c555ef3a9b837d5af3c1a415d175e42c95c41c14d20036b0cb56b4b75a54d5f55bb7d3291af9db95a5d136999ebf9d

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              13KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              9f68d94823b98cd80ac4520716a8cdfc

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              2680848a63d8420c4e4d97b86f899badc7e5d523

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              ad30a31e6e329d5b5716a3b705863f61914058babce7db2229ac08670841fcec

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              b20d139d28775bbb057ed22cc6449da14f91b10af9c0fea72f8a51e96507467d512a46d45115990f3dc155a3f7d1a8b617a260090d703b77afcbe1b3ae087ed6

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              4KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              b9b28bbf1e34c685430620b1bcb1e0d3

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              4604b242884a60c2bec8363c6455b7fb1cc33f4f

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              4919647ab337766ddb24fd967e353a4c2fff51e66ba7c2aa66fe0dcb83ac14e3

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              228ee0c59e41f9700f77ebd7bed827217b91c4bf0a58de7839dd564b9a5cd7af5d4dc5beb74efb23ff44ad4ab97c236325e9ef0494d4ca4f2909fb239907b94e

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              4KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              658c187f7e4f3d0ba83de085bef6ac3a

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              de290b20b8297c7ed77bcea83700e2c98b8477be

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              bafdb35241226faf181457beecb0ca45725b834c06d3410be180780433da20e3

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              d2db1443b39575691d48a3a2a0de79718c9bd7eb005d39f3a0e30dfcf906a73fd788fe39e59ce5b59d0b552c1fe888257c12ac98d00a22541cdba1c4f05478ad

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              4KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              783120a13d716b822fb0b8809a77128b

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              ee0efd786bee7387b0765ac2eb6348dac3b4203b

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              db72b9f2b13bd6a60068e2e8d7e7bebf81f68e4acd2dc23dbb13c707b19290ad

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              a9ce3cdffd7262cfcc3b3e523f19aa3beb31425fe16ec58b77765b55f934b29b6a7b8d3d48ae66da562acd3bbb1a1c02f9a9c98feeeb7b1f8165b70e3faffb42

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              3KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              6355bb993ab5ef9c9ee00342103ea98f

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              5e9038f26e2d45820815e3f5cd4851d7f3348d20

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              d9e2f1d7af9784de12c0dd416ef747ff796209cc02b0c4677a98e36ff1ba14ac

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              45d8f063ea7d2644a999f2e12e69b13ff52040f6e7465896992c3c52ae032885f2a8b49bb70d9a94a3f748505f56acb94027a00d2008902b4301abdd22a5f395

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              3KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              6d57066710bfcf06c17d069cb7392692

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              9908790f3a43e00cca2cd83abbf09d7050eec625

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              2e55ac706c83af50e91f078d77e62b023230eea7e0103c75a009a39f81c6668b

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              a84eb68ff7e96b898830133d3eb276e7484769b08ad3f010457ff517e9b56de8856ff957ec702eb5a472c976de096509b8531028c63f460c8b9d538300dec096

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              3KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              085d5083a0b475d70e2f0f8355d2db16

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              dd111e086846de192d6459bd6497932a6f389220

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              bd4e960c1ff186e382d3fee2f82b66f2f5be032a77332d70018f1e64dedc1298

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              b2b6ffbde72c8b182fcdd96e935e70b34dd72569dfd96577db5cb991fe39f1711d68f8a22c173e992d3ff4ee19fac899942e1f444f090cbaf2236ac41fcacde4

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              3KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              3b79b0e1ec8effbf9e30ffae2a5dbc33

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              3531ad3537a6e86e8f133e8ed68afba78f4b3397

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              63f40c4eca47adec39ad82e19f0472af1bc0e1720ff8b2f0dd06ac7b72d0fd17

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              e669979db0b8877e9f898f75c802e7d3e22ed8d7de5d59af6b0ae292fcc1331f5b275f4b1c22f662da933f8d4380abb614c15e9780f56928a837b8da5fe7d958

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe5961cd.TMP

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              3KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              204ea233d57779f7390f2c27cd0277b1

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              eb8908ad43cd19bad239f05d507f23aab4762715

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              c28185c6b6c104d72d66260afedf836a05ca5f525ba356309fd03fdf6cc1f93d

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              01dadd59c34b6d3e7e6ed5a52e6e3924b8bd1e856d923146dbf114602d24aa5a7e44a109c7e8f3e1d899d3bd2ac5c510775180c81d76c70b1f7a55fe904b6b9c

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              16B

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              6752a1d65b201c13b62ea44016eb221f

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              16B

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              206702161f94c5cd39fadd03f4014d98

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              16B

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              aefd77f47fb84fae5ea194496b44c67a

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              dcfbb6a5b8d05662c4858664f81693bb7f803b82

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              16B

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              46295cac801e5d4857d09837238a6394

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Last Version

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              11B

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              838a7b32aefb618130392bc7d006aa2e

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              5159e0f18c9e68f0e75e2239875aa994847b8290

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              ac3dd2221d90b09b795f1f72e72e4860342a4508fe336c4b822476eb25a55eaa

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              9e350f0565cc726f66146838f9cebaaa38dd01892ffab9a45fe4f72e5be5459c0442e99107293a7c6f2412c71f668242c5e5a502124bc57cbf3b6ad8940cb3e9

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              11KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              5d481694baf4a717352092e43eba601f

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              3db15bed584298104f17a481cba86454772f5f58

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              014892fe7f41f32cce9edb5fa71d4c2140d382167d0e0041059f047a22734da6

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              883de6ecd765970e5b34451595ff257cc60c394c7103d23a9d108286e61146ac7f5e6fac74ecf21f00b3966a123d6f1a6a4cea2a495fea6e1965db53b56d8852

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              11KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              5177d6ff545d44d9b5999667c3438ca0

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              dd57f76064008a31868694162d000814b3d811bd

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              88ac9d7d6efa5a93cf22fd2211d093a9bba27d16dcdd164566078f839b95eabe

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              b2fda085ad4b09e344b8501ea91ea5f589c6fb0bb1bdfc7d6601b0e37f322e69bccc276eaa46130152f75230e6d12b426feb09d8b4cd524ac85439e73824d356

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              11KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              45dc7ca8e0daac47511dbb90e39e6bcb

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              163299a33b1e379e1aeee1e70aecc684b361ab9b

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              3c664d791805fc0dee6633033e951541320008f51cc7ef8b76f6103b60a122f3

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              7ae143ce2bedc09fb9bfe40f4d2fc41d4ed55959ef56b94b59d4e843a659e9a6d3dae880d58ba4d43a9764bae892970b23ccd55d7abba2aadea55c215d33747c

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              11KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              b9e34ba194411fdfbba722f89cea134f

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              b41c0b8e7f8474b45c928a3fa910c261344cf495

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              0cd887b3183c4685cd0e9160560c7acc82ac3bc9817e44c7f144b87bb2b0aa86

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              bd5d0dba56ecb12d8342639dd9565b75f4b38470ca3d9828ab94d3dfc0dc71975bee5b1b3f59119b532f399b949c4a3b94b97e4cc3fb2d0c2d741a1391e5ee08

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              11KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              35f481a3239857fb1efc88447ffaab90

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              adecc637527a5668f736f5889dcc64d9b76e908b

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              9393fb7c6e512788117b5108d2b059c191c2275c5540e9f715324fb0e11044a0

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              32f7a027a7cad6f9d0d2348619d350e69974f6d392260f1fefedd1c619b2c72a6676d4a83f7af060dc818981ec5768bab0f33e11efb6625817d697818efc1e3b

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              11KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              8ed99cb1d78808a7414447afb3025a87

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              b9ad0d1b511f82b8811e491404f78ac3aa9a8482

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              951e2c3f671bc74de6f82e1a342d7fe4cd0bb6a67e4fef22bac8e54fab380f5d

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              134aa430b989c4a797d83dd35d9cb91f1ded43328d65bb653716bf71b4320856c0f7ba677b7b6a65f12872dc5e57703d434776f853a3972007a023ac9d28960b

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              12KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              f65e586a7f22ba3c3f533e0e8eb38302

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              5a986a89564f0eef567f4e1239650abf86bc2592

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              9b7c025b081f02bb456d1f07f9ef0d8f7f2e2294553cab796f729c3cd89dd600

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              adb7f3a7c7587fd158efb0426347a622ff6e7b20529379e9fb5c9f443f0dad612dbbb2b3cc96ae833ec8e691e709b3f4c6d98b20d8bb5a12f105b38d53744704

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              264KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              6836adc4f0a02c2b2fdf3954f658d767

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              512d5e6be293508b12412f671a4fa799c0b1b74a

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              9e5e3b301bc239d1e648276bbd1627b353d21e50f8471a83675cf21886c912df

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              8422abad85d6df6403dcbe94723c271f1c39975344b9f092e56ea47524ce31443e0b6e4de12f5e3279450ba6dbd920e3826eea1a1639f83834cd0f2b29d8767c

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Microsoft\OneNote\16.0\cache\_R_E_A_D___T_H_I_S___IGXACSYQ_.txt

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              1KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              abf4c74dd9fb190768818c0350f8a492

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              352e4999146c7f9f7dee951b72812f8128021877

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              5cc58ad7b30aea943034ae3828cae02165d6e2e9256f1d497bf16dbf53b93707

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              ba1db5d286582b3dd499379e5f64772ab4543d2149f4bff501eb6261fefda5dedbdb7645ceabdcdc9db26bc18cf0c0430fc50fd072c487e91e533d48569697e6

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\fz3nlbuq.default-release\activity-stream.discovery_stream.json.tmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              21KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              f5ce99c7ef4886e644f7d59c8ba6008f

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              0f50fc8dc415c2fa8f2f4b119bd23ed6a1d857ba

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              7fa68f66edee5799aaf7761b1eaa28d6f3dd9f10c018cb9b9726c63d798983ef

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              e181a1dfa42261f4ea4a5f11e42c350a5da27e00a6213f194a62d595f3ccf65e9d0d8ee3fe4ac7be8871d908c4f7f51c7c6f46ddd6204d72945a0aeb96445a09

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              479KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              09372174e83dbbf696ee732fd2e875bb

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              ba360186ba650a769f9303f48b7200fb5eaccee1

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              13.8MB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              0a8747a2ac9ac08ae9508f36c6d75692

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\OneNote\16.0\_R_E_A_D___T_H_I_S___A5ED_.hta

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              75KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              63c10216ca45d14b4574e65be4401a6b

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              dd7e5d296b742f33d387b024bc37e1096d3b4f96

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              0d2314a64754a6a103f2cc3144743c6ca0924825476b7eca617d71de0a9a4e49

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              d1d128575af3f6bb6454a0dfa5b57f177f9f580a5fd28931100e3ca9a47cf63f9d9d19cff69991426e313cee5eb6f64b5020490683d1287ba78aa9a38c9a2ca9

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\fz3nlbuq.default-release\AlternateServices.bin

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              8KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              6cf6e540f34e8bd2e587f375df89ae4e

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              4838dfc734fa7f23bbffd918e8b095a6fa257455

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              2ffd89c5010e9171ef20fc889bb42f853b4f2820c4003b1903508d6ecc1a034f

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              27e4ec660a02089f4f2c0a0bb81b57216848af039c97ee9918184194f22e4889c0d0e9520d52d4842d07984284504b66849cff6472b74e2cb86ac75059e7585a

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\fz3nlbuq.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              5KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              c375068dcebb93f33a3a8311c0af2cea

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              80bf9a6817003157860c7d554cb431f6a6daf318

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              77d168e95d73b14be9ff5c32738c8a8e9c59aaf29a3455c974c1ec2414076fd6

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              469d0b6e208eedc2b7d2e973acfde085268544e81190e77a000ba7cab85888e2f07fb117de1f8cb416999fb5d48729d3a26efb45b03c116b442ab893e998fc30

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\fz3nlbuq.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              6KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              7a6527c18fb3c0c536b76bed9e4d3e42

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              b3558a65c005e782ffbef3def226c3a0c58e9721

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              772bbf48794f80a807a31de0d18cac9d0ecf280f87139ac5c1cfe749798b0f8b

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              8c280d08b08494ab8f817dc65dcda319fd96ee94bad7e0a8fe26ff8b11da83077350e755f26602422cc7a0feae2c94951feb1454b983b88f5bf10b2feae0fc66

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\fz3nlbuq.default-release\datareporting\glean\pending_pings\5b196880-4828-41d3-a623-336cb482ea55

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              26KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              02b0f32b72a0143c92df26bcd4fd8869

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              3d666bebfe9cc349a7b24877a53eaf71620eb70c

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              e35d2febc51f9a8bcfe91342ee8b94ea7c77028bd293918688763ba61117086c

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              0f1427fd9d0493ac2fd708b556f5f4db1eb851bcb8c41dd3de05d695f023db171824e0f31f39231bf068341cffcaf9146a1a35d7fe5c2ee64217527c06e33da3

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\fz3nlbuq.default-release\datareporting\glean\pending_pings\8f50cd0a-7a3e-40f9-a9be-873481f5e0b9

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              671B

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              7c36cbb2e4104d58e781e0a34f55648a

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              f678df8a2d978aa5cf87bbe45a6d9f54157ca16e

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              393787d05f8b06df442c720e3216e62e3613f50e0723e61698918915fecad487

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              19737d3110777b22e2948e35f2cfede1c510f1d4a937425c03dcc3cfaeb1fd8d6e7c8073c2407acedc1d1b4e1d181005dcef2ff035d8de18c5f5f90ca98e6128

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\fz3nlbuq.default-release\datareporting\glean\pending_pings\e0c5cdfc-4cbb-48fd-b9d5-efedf3ea26e6

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              982B

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              210dd4e928e517910d459a39d9405b74

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              065327928d77bb1dc0986382f725cac57a34353f

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              fc5f4ad78f7e7cada7d8f2306d4de74954a0138b1e806ba81fc69339ace079a5

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              54560e668af4fbe51e06a25ab7454e69f40f40c2133d0f02e9a97fc9f1ad4e23e5532723b24f3567104ac0b4452e1852322aca534a462dc41230848ffaf85cc9

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\fz3nlbuq.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              1.1MB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              842039753bf41fa5e11b3a1383061a87

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\fz3nlbuq.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              116B

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              2a461e9eb87fd1955cea740a3444ee7a

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              b10755914c713f5a4677494dbe8a686ed458c3c5

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\fz3nlbuq.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              372B

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              bf957ad58b55f64219ab3f793e374316

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\fz3nlbuq.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              17.8MB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              daf7ef3acccab478aaa7d6dc1c60f865

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              f8246162b97ce4a945feced27b6ea114366ff2ad

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\fz3nlbuq.default-release\prefs-1.js

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              12KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              2152d9d7d82c86e8f4170cc70a96c745

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              cf8443eab68c2369180d31370c53fc27bb9ea7a7

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              e1725bec79dc7c57758af8e4820439188c6e37288a6ca7d0ef7baf3186e10372

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              f2a2ff866ec5a38fba43fab222a6d880b8e0a10ea5a8dddfa897463004fb05c06219d7f2a28688ef5d5a2dcc5492069b3456b5e59fc9fa21d524fe3ad24189a5

                                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\fz3nlbuq.default-release\prefs.js

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              11KB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              c13e343f90bb4c83f637ebeb485ebee8

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              957acd4daf08d5aa4c2496461060b44901cdfe43

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              2760e4dd1712f5339fc21133c4e3d914fff678dc91efd3352cd57dfd95cf3bc8

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              16e8797ab9347b4cd72ce38ed502975012ed5c0278c7230822e632e01ffacfaba87ae12ec84060c67870e22c18d37602801a7f4c61e7809037f9c852ec42a28c

                                                                                                                                                                                                            • C:\Users\Admin\Downloads\Unconfirmed 67985.crdownload

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              15.1MB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              e88a0140466c45348c7b482bb3e103df

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              c59741da45f77ed2350c72055c7b3d96afd4bfc1

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              bab1853454ca6fdd3acd471254101db1b805b601e309a49ec7b4b1fbcfc47ad7

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              2dc9682f4fb6ea520acc505bdbe7671ab7251bf9abd25a5275f0c543a6157d7fa5325b9dce6245e035641ab831d646f0e14f6649f9464f5e97431ab1bf7da431

                                                                                                                                                                                                            • C:\Users\Admin\Downloads\nDPMOdpx.part

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              7.3MB

                                                                                                                                                                                                              MD5

                                                                                                                                                                                                              5bd44a35094fe6f7794d895122ddfa62

                                                                                                                                                                                                              SHA1

                                                                                                                                                                                                              98172e49c3d5d70ffdcefd071f9762c58430a393

                                                                                                                                                                                                              SHA256

                                                                                                                                                                                                              762a4f2bf5ea4ff72fce674da1adf29f0b9357be18de4cd992d79198c56bb514

                                                                                                                                                                                                              SHA512

                                                                                                                                                                                                              4033c7335a44a7536a3980aad8cf18ff6336186d71dd7b7f02c3d5c93001ed974285fe9fbbf783bc0abac3e3b3581993ad6d2ac285249aa24b0aafa261f74de8

                                                                                                                                                                                                            • memory/1592-2569-0x000001E183F50000-0x000001E183F51000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              4KB

                                                                                                                                                                                                            • memory/1592-2570-0x000001E183F50000-0x000001E183F51000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              4KB

                                                                                                                                                                                                            • memory/1592-2574-0x000001E183F50000-0x000001E183F51000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              4KB

                                                                                                                                                                                                            • memory/1592-2573-0x000001E183F50000-0x000001E183F51000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              4KB

                                                                                                                                                                                                            • memory/1592-2571-0x000001E183F50000-0x000001E183F51000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              4KB

                                                                                                                                                                                                            • memory/1592-2575-0x000001E183F50000-0x000001E183F51000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              4KB

                                                                                                                                                                                                            • memory/1592-2565-0x000001E183F50000-0x000001E183F51000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              4KB

                                                                                                                                                                                                            • memory/1592-2564-0x000001E183F50000-0x000001E183F51000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              4KB

                                                                                                                                                                                                            • memory/1592-2563-0x000001E183F50000-0x000001E183F51000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              4KB

                                                                                                                                                                                                            • memory/1592-2572-0x000001E183F50000-0x000001E183F51000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              4KB

                                                                                                                                                                                                            • memory/1740-2513-0x000000001B9F0000-0x000000001BEBE000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              4.8MB

                                                                                                                                                                                                            • memory/1740-2517-0x000000001D700000-0x000000001D752000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              328KB

                                                                                                                                                                                                            • memory/1740-2516-0x00000000027C0000-0x00000000027C8000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              32KB

                                                                                                                                                                                                            • memory/1740-2515-0x000000001D080000-0x000000001D0E2000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              392KB

                                                                                                                                                                                                            • memory/1740-2514-0x000000001BF60000-0x000000001BFFC000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              624KB

                                                                                                                                                                                                            • memory/2248-2284-0x0000000000400000-0x0000000000435000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              212KB

                                                                                                                                                                                                            • memory/2248-2257-0x0000000000400000-0x0000000000435000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              212KB

                                                                                                                                                                                                            • memory/2248-1893-0x0000000000400000-0x0000000000435000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              212KB

                                                                                                                                                                                                            • memory/2248-1889-0x0000000000400000-0x0000000000435000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              212KB

                                                                                                                                                                                                            • memory/2248-1886-0x0000000000400000-0x0000000000435000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              212KB

                                                                                                                                                                                                            • memory/5816-2276-0x0000000000440000-0x0000000000451000-memory.dmp

                                                                                                                                                                                                              Filesize

                                                                                                                                                                                                              68KB