Resubmissions

20-12-2024 16:52

241220-vdt43s1jcm 10

20-12-2024 16:50

241220-vcmnls1jbm 10

20-12-2024 16:45

241220-t9wr4szlb1 10

Analysis

  • max time kernel
    152s
  • max time network
    603s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20241211-de
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20241211-delocale:de-deos:windows10-ltsc 2021-x64systemwindows
  • submitted
    20-12-2024 16:52

Errors

Reason
Machine shutdown

General

  • Target

    https://polovoiinspektor.shop/rules/bash.txt

Malware Config

Signatures

  • Detect Vidar Stealer 6 IoCs
  • Vidar

    Vidar is an infostealer based on Arkei stealer.

  • Vidar family
  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates processes with tasklist 1 TTPs 10 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 15 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 5 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 53 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • NTFS ADS 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://polovoiinspektor.shop/rules/bash.txt
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3456
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x124,0x128,0x12c,0x100,0x130,0x7ff9cde546f8,0x7ff9cde54708,0x7ff9cde54718
      2⤵
        PID:3704
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,8809081311010709664,2584000947128156179,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:2
        2⤵
          PID:1564
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,8809081311010709664,2584000947128156179,131072 --lang=de --service-sandbox-type=none --mojo-platform-channel-handle=2376 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2644
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,8809081311010709664,2584000947128156179,131072 --lang=de --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:8
          2⤵
            PID:2212
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8809081311010709664,2584000947128156179,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:1
            2⤵
              PID:3572
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8809081311010709664,2584000947128156179,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:1
              2⤵
                PID:2940
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,8809081311010709664,2584000947128156179,131072 --lang=de --service-sandbox-type=none --mojo-platform-channel-handle=5856 /prefetch:8
                2⤵
                  PID:4712
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings
                  2⤵
                  • Drops file in Program Files directory
                  PID:3672
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0x7ff7598b5460,0x7ff7598b5470,0x7ff7598b5480
                    3⤵
                      PID:4532
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,8809081311010709664,2584000947128156179,131072 --lang=de --service-sandbox-type=none --mojo-platform-channel-handle=5856 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2628
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8809081311010709664,2584000947128156179,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5884 /prefetch:1
                    2⤵
                      PID:4308
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8809081311010709664,2584000947128156179,131072 --lang=de --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5968 /prefetch:1
                      2⤵
                        PID:5088
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8809081311010709664,2584000947128156179,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:1
                        2⤵
                          PID:3220
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8809081311010709664,2584000947128156179,131072 --lang=de --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6036 /prefetch:1
                          2⤵
                            PID:4960
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8809081311010709664,2584000947128156179,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5924 /prefetch:1
                            2⤵
                              PID:1268
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2072,8809081311010709664,2584000947128156179,131072 --lang=de --service-sandbox-type=collections --mojo-platform-channel-handle=4176 /prefetch:8
                              2⤵
                                PID:2068
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8809081311010709664,2584000947128156179,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:1
                                2⤵
                                  PID:3088
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2072,8809081311010709664,2584000947128156179,131072 --lang=de --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6532 /prefetch:8
                                  2⤵
                                    PID:4440
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8809081311010709664,2584000947128156179,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:1
                                    2⤵
                                      PID:4852
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2072,8809081311010709664,2584000947128156179,131072 --lang=de --service-sandbox-type=none --mojo-platform-channel-handle=3444 /prefetch:8
                                      2⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:3660
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8809081311010709664,2584000947128156179,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4904 /prefetch:1
                                      2⤵
                                        PID:3620
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8809081311010709664,2584000947128156179,131072 --lang=de --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:1
                                        2⤵
                                          PID:772
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8809081311010709664,2584000947128156179,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6736 /prefetch:1
                                          2⤵
                                            PID:2600
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,8809081311010709664,2584000947128156179,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3536 /prefetch:2
                                            2⤵
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:5440
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8809081311010709664,2584000947128156179,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:1
                                            2⤵
                                              PID:2052
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8809081311010709664,2584000947128156179,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4840 /prefetch:1
                                              2⤵
                                                PID:636
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8809081311010709664,2584000947128156179,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:1
                                                2⤵
                                                  PID:5240
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8809081311010709664,2584000947128156179,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6296 /prefetch:1
                                                  2⤵
                                                    PID:5048
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8809081311010709664,2584000947128156179,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6088 /prefetch:1
                                                    2⤵
                                                      PID:3700
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8809081311010709664,2584000947128156179,131072 --lang=de --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:1
                                                      2⤵
                                                        PID:5264
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8809081311010709664,2584000947128156179,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5884 /prefetch:1
                                                        2⤵
                                                          PID:2508
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8809081311010709664,2584000947128156179,131072 --lang=de --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6584 /prefetch:1
                                                          2⤵
                                                            PID:5308
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8809081311010709664,2584000947128156179,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:1
                                                            2⤵
                                                              PID:5436
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8809081311010709664,2584000947128156179,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6676 /prefetch:1
                                                              2⤵
                                                                PID:5804
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2072,8809081311010709664,2584000947128156179,131072 --lang=de --service-sandbox-type=collections --mojo-platform-channel-handle=5504 /prefetch:8
                                                                2⤵
                                                                  PID:3224
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8809081311010709664,2584000947128156179,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3144 /prefetch:1
                                                                  2⤵
                                                                    PID:5208
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2072,8809081311010709664,2584000947128156179,131072 --lang=de --service-sandbox-type=none --mojo-platform-channel-handle=6784 /prefetch:8
                                                                    2⤵
                                                                      PID:1172
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2072,8809081311010709664,2584000947128156179,131072 --lang=de --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5460 /prefetch:8
                                                                      2⤵
                                                                        PID:5956
                                                                      • C:\Users\Admin\Downloads\YouAreAnIdiot.exe
                                                                        "C:\Users\Admin\Downloads\YouAreAnIdiot.exe"
                                                                        2⤵
                                                                          PID:5024
                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 5024 -s 1448
                                                                            3⤵
                                                                            • Program crash
                                                                            PID:2076
                                                                        • C:\Users\Admin\Downloads\YouAreAnIdiot.exe
                                                                          "C:\Users\Admin\Downloads\YouAreAnIdiot.exe"
                                                                          2⤵
                                                                            PID:1164
                                                                          • C:\Users\Admin\Downloads\YouAreAnIdiot.exe
                                                                            "C:\Users\Admin\Downloads\YouAreAnIdiot.exe"
                                                                            2⤵
                                                                              PID:2024
                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 2024 -s 1228
                                                                                3⤵
                                                                                • Program crash
                                                                                PID:1924
                                                                            • C:\Users\Admin\Downloads\YouAreAnIdiot.exe
                                                                              "C:\Users\Admin\Downloads\YouAreAnIdiot.exe"
                                                                              2⤵
                                                                                PID:5816
                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 5816 -s 1252
                                                                                  3⤵
                                                                                  • Program crash
                                                                                  PID:2732
                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2072,8809081311010709664,2584000947128156179,131072 --lang=de --service-sandbox-type=collections --mojo-platform-channel-handle=7172 /prefetch:8
                                                                                2⤵
                                                                                  PID:6128
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8809081311010709664,2584000947128156179,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7320 /prefetch:1
                                                                                  2⤵
                                                                                    PID:2836
                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2072,8809081311010709664,2584000947128156179,131072 --lang=de --service-sandbox-type=none --mojo-platform-channel-handle=5116 /prefetch:8
                                                                                    2⤵
                                                                                      PID:3744
                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2072,8809081311010709664,2584000947128156179,131072 --lang=de --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3392 /prefetch:8
                                                                                      2⤵
                                                                                        PID:5448
                                                                                      • C:\Users\Admin\Downloads\WinNuke.98.exe
                                                                                        "C:\Users\Admin\Downloads\WinNuke.98.exe"
                                                                                        2⤵
                                                                                          PID:1408
                                                                                        • C:\Users\Admin\Downloads\WinNuke.98.exe
                                                                                          "C:\Users\Admin\Downloads\WinNuke.98.exe"
                                                                                          2⤵
                                                                                            PID:2508
                                                                                          • C:\Users\Admin\Downloads\WinNuke.98.exe
                                                                                            "C:\Users\Admin\Downloads\WinNuke.98.exe"
                                                                                            2⤵
                                                                                              PID:5792
                                                                                            • C:\Users\Admin\Downloads\WinNuke.98.exe
                                                                                              "C:\Users\Admin\Downloads\WinNuke.98.exe"
                                                                                              2⤵
                                                                                                PID:4408
                                                                                              • C:\Users\Admin\Downloads\WinNuke.98.exe
                                                                                                "C:\Users\Admin\Downloads\WinNuke.98.exe"
                                                                                                2⤵
                                                                                                  PID:2908
                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8809081311010709664,2584000947128156179,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=45 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6672 /prefetch:1
                                                                                                  2⤵
                                                                                                    PID:2116
                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2072,8809081311010709664,2584000947128156179,131072 --lang=de --service-sandbox-type=none --mojo-platform-channel-handle=6792 /prefetch:8
                                                                                                    2⤵
                                                                                                      PID:2948
                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8809081311010709664,2584000947128156179,131072 --lang=de --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=48 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7152 /prefetch:1
                                                                                                      2⤵
                                                                                                        PID:5940
                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2072,8809081311010709664,2584000947128156179,131072 --lang=de --service-sandbox-type=none --mojo-platform-channel-handle=7476 /prefetch:8
                                                                                                        2⤵
                                                                                                          PID:5576
                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2072,8809081311010709664,2584000947128156179,131072 --lang=de --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7296 /prefetch:8
                                                                                                          2⤵
                                                                                                            PID:5380
                                                                                                          • C:\Users\Admin\Downloads\7ev3n.exe
                                                                                                            "C:\Users\Admin\Downloads\7ev3n.exe"
                                                                                                            2⤵
                                                                                                              PID:5808
                                                                                                              • C:\Users\Admin\AppData\Local\system.exe
                                                                                                                "C:\Users\Admin\AppData\Local\system.exe"
                                                                                                                3⤵
                                                                                                                  PID:2708
                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                    C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\del.bat
                                                                                                                    4⤵
                                                                                                                      PID:4724
                                                                                                                    • C:\Windows\SysWOW64\SCHTASKS.exe
                                                                                                                      C:\Windows\System32\SCHTASKS.exe /create /SC ONLOGON /TN uac /TR "C:\Users\Admin\AppData\Local\bcd.bat" /RL HIGHEST /f
                                                                                                                      4⤵
                                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                                      PID:5620
                                                                                                                    • C:\windows\SysWOW64\cmd.exe
                                                                                                                      C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                                                                                      4⤵
                                                                                                                        PID:3728
                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                          REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                                                                                          5⤵
                                                                                                                            PID:5472
                                                                                                                        • C:\windows\SysWOW64\cmd.exe
                                                                                                                          C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                                                                                          4⤵
                                                                                                                            PID:5644
                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                              REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                                                                                              5⤵
                                                                                                                                PID:4480
                                                                                                                            • C:\windows\SysWOW64\cmd.exe
                                                                                                                              C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout" /v "Scancode Map" /t REG_BINARY /d "00000000000000001700000000003800000038e000005be000005ce00000360000001d0000001de000000f000000010000001c0000003e0000003b00000044000000450000003d0000005de000000000" /f /reg:64
                                                                                                                              4⤵
                                                                                                                                PID:6096
                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                  REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout" /v "Scancode Map" /t REG_BINARY /d "00000000000000001700000000003800000038e000005be000005ce00000360000001d0000001de000000f000000010000001c0000003e0000003b00000044000000450000003d0000005de000000000" /f /reg:64
                                                                                                                                  5⤵
                                                                                                                                    PID:4676
                                                                                                                                • C:\windows\SysWOW64\cmd.exe
                                                                                                                                  C:\windows\system32\cmd.exe /c REG ADD "HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys" /v "Flags" /t REG_SZ /d 506 /f /reg:64
                                                                                                                                  4⤵
                                                                                                                                    PID:3900
                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                      REG ADD "HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys" /v "Flags" /t REG_SZ /d 506 /f /reg:64
                                                                                                                                      5⤵
                                                                                                                                        PID:5440
                                                                                                                                    • C:\windows\SysWOW64\cmd.exe
                                                                                                                                      C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "rgd_bcd_condition" /t REG_SZ /d 1 /f /reg:64
                                                                                                                                      4⤵
                                                                                                                                        PID:3680
                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                          REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "rgd_bcd_condition" /t REG_SZ /d 1 /f /reg:64
                                                                                                                                          5⤵
                                                                                                                                            PID:3284
                                                                                                                                        • C:\windows\SysWOW64\cmd.exe
                                                                                                                                          C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f /reg:64
                                                                                                                                          4⤵
                                                                                                                                            PID:2000
                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                              REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f /reg:64
                                                                                                                                              5⤵
                                                                                                                                                PID:2224
                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                              C:\Windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "crypted" /t REG_SZ /d 1 /f /reg:64
                                                                                                                                              4⤵
                                                                                                                                                PID:1744
                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                  REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "crypted" /t REG_SZ /d 1 /f /reg:64
                                                                                                                                                  5⤵
                                                                                                                                                    PID:5704
                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                  C:\Windows\system32\cmd.exe /c shutdown -r -t 10 -f
                                                                                                                                                  4⤵
                                                                                                                                                    PID:1172
                                                                                                                                                    • C:\Windows\SysWOW64\shutdown.exe
                                                                                                                                                      shutdown -r -t 10 -f
                                                                                                                                                      5⤵
                                                                                                                                                        PID:3520
                                                                                                                                                • C:\Users\Admin\Downloads\7ev3n.exe
                                                                                                                                                  "C:\Users\Admin\Downloads\7ev3n.exe"
                                                                                                                                                  2⤵
                                                                                                                                                    PID:3828
                                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\del.bat
                                                                                                                                                      3⤵
                                                                                                                                                        PID:4376
                                                                                                                                                      • C:\Windows\SysWOW64\SCHTASKS.exe
                                                                                                                                                        C:\Windows\System32\SCHTASKS.exe /create /SC ONLOGON /TN uac /TR "C:\Users\Admin\AppData\Local\bcd.bat" /RL HIGHEST /f
                                                                                                                                                        3⤵
                                                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                                                        PID:4072
                                                                                                                                                      • C:\windows\SysWOW64\cmd.exe
                                                                                                                                                        C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                                                                                                                        3⤵
                                                                                                                                                          PID:60
                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                            REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                                                                                                                            4⤵
                                                                                                                                                              PID:2300
                                                                                                                                                          • C:\windows\SysWOW64\cmd.exe
                                                                                                                                                            C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                                                                                                                            3⤵
                                                                                                                                                              PID:1824
                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "System" /t REG_SZ /d "C:\Users\Admin\AppData\Local\system.exe" /f /reg:64
                                                                                                                                                                4⤵
                                                                                                                                                                  PID:3792
                                                                                                                                                              • C:\windows\SysWOW64\cmd.exe
                                                                                                                                                                C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout" /v "Scancode Map" /t REG_BINARY /d "00000000000000001700000000003800000038e000005be000005ce00000360000001d0000001de000000f000000010000001c0000003e0000003b00000044000000450000003d0000005de000000000" /f /reg:64
                                                                                                                                                                3⤵
                                                                                                                                                                  PID:6076
                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                    REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Keyboard Layout" /v "Scancode Map" /t REG_BINARY /d "00000000000000001700000000003800000038e000005be000005ce00000360000001d0000001de000000f000000010000001c0000003e0000003b00000044000000450000003d0000005de000000000" /f /reg:64
                                                                                                                                                                    4⤵
                                                                                                                                                                      PID:4608
                                                                                                                                                                  • C:\windows\SysWOW64\cmd.exe
                                                                                                                                                                    C:\windows\system32\cmd.exe /c REG ADD "HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys" /v "Flags" /t REG_SZ /d 506 /f /reg:64
                                                                                                                                                                    3⤵
                                                                                                                                                                      PID:6084
                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                        REG ADD "HKEY_CURRENT_USER\Control Panel\Accessibility\StickyKeys" /v "Flags" /t REG_SZ /d 506 /f /reg:64
                                                                                                                                                                        4⤵
                                                                                                                                                                          PID:5108
                                                                                                                                                                      • C:\windows\SysWOW64\cmd.exe
                                                                                                                                                                        C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "rgd_bcd_condition" /t REG_SZ /d 1 /f /reg:64
                                                                                                                                                                        3⤵
                                                                                                                                                                          PID:1120
                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                            REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "rgd_bcd_condition" /t REG_SZ /d 1 /f /reg:64
                                                                                                                                                                            4⤵
                                                                                                                                                                              PID:1152
                                                                                                                                                                          • C:\windows\SysWOW64\cmd.exe
                                                                                                                                                                            C:\windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f /reg:64
                                                                                                                                                                            3⤵
                                                                                                                                                                              PID:3212
                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d 0 /f /reg:64
                                                                                                                                                                                4⤵
                                                                                                                                                                                  PID:5516
                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                C:\Windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "crypted" /t REG_SZ /d 1 /f /reg:64
                                                                                                                                                                                3⤵
                                                                                                                                                                                  PID:6008
                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                    REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "crypted" /t REG_SZ /d 1 /f /reg:64
                                                                                                                                                                                    4⤵
                                                                                                                                                                                      PID:5656
                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c shutdown -r -t 10 -f
                                                                                                                                                                                    3⤵
                                                                                                                                                                                      PID:5700
                                                                                                                                                                                      • C:\Windows\SysWOW64\shutdown.exe
                                                                                                                                                                                        shutdown -r -t 10 -f
                                                                                                                                                                                        4⤵
                                                                                                                                                                                          PID:2224
                                                                                                                                                                                    • C:\Users\Admin\Downloads\7ev3n.exe
                                                                                                                                                                                      "C:\Users\Admin\Downloads\7ev3n.exe"
                                                                                                                                                                                      2⤵
                                                                                                                                                                                        PID:2440
                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\del.bat
                                                                                                                                                                                          3⤵
                                                                                                                                                                                            PID:2320
                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "crypted" /t REG_SZ /d 1 /f /reg:64
                                                                                                                                                                                            3⤵
                                                                                                                                                                                              PID:1612
                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "crypted" /t REG_SZ /d 1 /f /reg:64
                                                                                                                                                                                                4⤵
                                                                                                                                                                                                  PID:6132
                                                                                                                                                                                            • C:\Users\Admin\Downloads\7ev3n.exe
                                                                                                                                                                                              "C:\Users\Admin\Downloads\7ev3n.exe"
                                                                                                                                                                                              2⤵
                                                                                                                                                                                                PID:5832
                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\del.bat
                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                    PID:4448
                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "crypted" /t REG_SZ /d 1 /f /reg:64
                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                      PID:2456
                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                        REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "crypted" /t REG_SZ /d 1 /f /reg:64
                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                          PID:2228
                                                                                                                                                                                                    • C:\Users\Admin\Downloads\7ev3n.exe
                                                                                                                                                                                                      "C:\Users\Admin\Downloads\7ev3n.exe"
                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                        PID:5280
                                                                                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\del.bat
                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                            PID:1316
                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "crypted" /t REG_SZ /d 1 /f /reg:64
                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                              PID:5828
                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "crypted" /t REG_SZ /d 1 /f /reg:64
                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                  PID:1756
                                                                                                                                                                                                            • C:\Users\Admin\Downloads\7ev3n.exe
                                                                                                                                                                                                              "C:\Users\Admin\Downloads\7ev3n.exe"
                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                PID:5576
                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\del.bat
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                    PID:5324
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "crypted" /t REG_SZ /d 1 /f /reg:64
                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                      PID:5696
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                        REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion" /v "crypted" /t REG_SZ /d 1 /f /reg:64
                                                                                                                                                                                                                        4⤵
                                                                                                                                                                                                                          PID:2908
                                                                                                                                                                                                                  • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                                                                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                      PID:2860
                                                                                                                                                                                                                    • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                                                                                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                        PID:4596
                                                                                                                                                                                                                      • C:\Windows\System32\rundll32.exe
                                                                                                                                                                                                                        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                          PID:1228
                                                                                                                                                                                                                        • C:\Users\Admin\Downloads\PpmSubscriptions.exe
                                                                                                                                                                                                                          "C:\Users\Admin\Downloads\PpmSubscriptions.exe"
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                          • Checks computer location settings
                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                          • Drops file in Windows directory
                                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                          PID:640
                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                            "C:\Windows\System32\cmd.exe" /c move Calcium Calcium.cmd & Calcium.cmd
                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                            PID:3604
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\tasklist.exe
                                                                                                                                                                                                                              tasklist
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                              • Enumerates processes with tasklist
                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                              PID:3700
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                                                                                              findstr /I "opssvc wrsa"
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                              PID:1376
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\tasklist.exe
                                                                                                                                                                                                                              tasklist
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                              • Enumerates processes with tasklist
                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                              PID:5268
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                                                                                              findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                              PID:5276
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                              cmd /c md 815951
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                              PID:5372
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                                                                                              findstr /V "artwork" Passed
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                              PID:5396
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                              cmd /c copy /b ..\Reporting + ..\One + ..\Liable + ..\Code + ..\Cashiers + ..\Est W
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                              PID:5420
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\815951\Screenshot.com
                                                                                                                                                                                                                              Screenshot.com W
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                              • Checks computer location settings
                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                              • Checks processor information in registry
                                                                                                                                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                              • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                              PID:5500
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\815951\Screenshot.com" & rd /s /q "C:\ProgramData\RIEUKNOH47GV" & exit
                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                PID:5848
                                                                                                                                                                                                                                • C:\Windows\SysWOW64\timeout.exe
                                                                                                                                                                                                                                  timeout /t 10
                                                                                                                                                                                                                                  5⤵
                                                                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                  • Delays execution with timeout.exe
                                                                                                                                                                                                                                  PID:5872
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\choice.exe
                                                                                                                                                                                                                              choice /d y /t 5
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                              PID:5520
                                                                                                                                                                                                                        • C:\Users\Admin\Downloads\PpmSubscriptions.exe
                                                                                                                                                                                                                          "C:\Users\Admin\Downloads\PpmSubscriptions.exe"
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                          • Checks computer location settings
                                                                                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                                                                                          • Drops file in Windows directory
                                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                          PID:2108
                                                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                            "C:\Windows\System32\cmd.exe" /c move Calcium Calcium.cmd & Calcium.cmd
                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                            PID:1480
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\tasklist.exe
                                                                                                                                                                                                                              tasklist
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                              • Enumerates processes with tasklist
                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                              PID:5648
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                                                                                              findstr /I "opssvc wrsa"
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                              PID:5656
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\tasklist.exe
                                                                                                                                                                                                                              tasklist
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                              • Enumerates processes with tasklist
                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                              PID:5748
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                                                                                              findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                              PID:5756
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                              cmd /c md 815951
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                              PID:5836
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                              cmd /c copy /b ..\Reporting + ..\One + ..\Liable + ..\Code + ..\Cashiers + ..\Est W
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                              PID:5868
                                                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\815951\Screenshot.com
                                                                                                                                                                                                                              Screenshot.com W
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                              • Executes dropped EXE
                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                              • Checks processor information in registry
                                                                                                                                                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                              • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                              • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                              PID:5888
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                "C:\Windows\system32\cmd.exe" /c timeout /t 10 & del /f /q "C:\Users\Admin\AppData\Local\Temp\815951\Screenshot.com" & rd /s /q "C:\ProgramData\5PZUK6PZ58YU" & exit
                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                  PID:5936
                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\timeout.exe
                                                                                                                                                                                                                                    timeout /t 10
                                                                                                                                                                                                                                    5⤵
                                                                                                                                                                                                                                    • Delays execution with timeout.exe
                                                                                                                                                                                                                                    PID:5044
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\choice.exe
                                                                                                                                                                                                                                choice /d y /t 5
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                PID:5904
                                                                                                                                                                                                                          • C:\Users\Admin\Downloads\PpmSubscriptions.exe
                                                                                                                                                                                                                            "C:\Users\Admin\Downloads\PpmSubscriptions.exe"
                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                            • Checks computer location settings
                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                            • Drops file in Windows directory
                                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                            PID:3080
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                              "C:\Windows\System32\cmd.exe" /c move Calcium Calcium.cmd & Calcium.cmd
                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                              PID:388
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\tasklist.exe
                                                                                                                                                                                                                                tasklist
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                • Enumerates processes with tasklist
                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                PID:5692
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                                                                                                findstr /I "opssvc wrsa"
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                PID:5700
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\tasklist.exe
                                                                                                                                                                                                                                tasklist
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                • Enumerates processes with tasklist
                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                PID:5792
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                                                                                                findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                PID:5800
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                cmd /c md 815951
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                PID:5848
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                cmd /c copy /b ..\Reporting + ..\One + ..\Liable + ..\Code + ..\Cashiers + ..\Est W
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                PID:5920
                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\815951\Screenshot.com
                                                                                                                                                                                                                                Screenshot.com W
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                                • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                PID:5940
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\choice.exe
                                                                                                                                                                                                                                choice /d y /t 5
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                PID:5988
                                                                                                                                                                                                                          • C:\Users\Admin\Downloads\PpmSubscriptions.exe
                                                                                                                                                                                                                            "C:\Users\Admin\Downloads\PpmSubscriptions.exe"
                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                            • Checks computer location settings
                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                            • Drops file in Windows directory
                                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                            PID:4076
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                              "C:\Windows\System32\cmd.exe" /c move Calcium Calcium.cmd & Calcium.cmd
                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                              PID:2116
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\tasklist.exe
                                                                                                                                                                                                                                tasklist
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                • Enumerates processes with tasklist
                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                PID:5948
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                                                                                                findstr /I "opssvc wrsa"
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                PID:5956
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\tasklist.exe
                                                                                                                                                                                                                                tasklist
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                • Enumerates processes with tasklist
                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                PID:6012
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                                                                                                findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                PID:6020
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                cmd /c md 815951
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                PID:6056
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                cmd /c copy /b ..\Reporting + ..\One + ..\Liable + ..\Code + ..\Cashiers + ..\Est W
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                PID:6072
                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\815951\Screenshot.com
                                                                                                                                                                                                                                Screenshot.com W
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                PID:6092
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\choice.exe
                                                                                                                                                                                                                                choice /d y /t 5
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                PID:6108
                                                                                                                                                                                                                          • C:\Users\Admin\Downloads\PpmSubscriptions.exe
                                                                                                                                                                                                                            "C:\Users\Admin\Downloads\PpmSubscriptions.exe"
                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                            • Checks computer location settings
                                                                                                                                                                                                                            • Executes dropped EXE
                                                                                                                                                                                                                            • Drops file in Windows directory
                                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                            PID:4728
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                              "C:\Windows\System32\cmd.exe" /c move Calcium Calcium.cmd & Calcium.cmd
                                                                                                                                                                                                                              2⤵
                                                                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                              PID:5224
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\tasklist.exe
                                                                                                                                                                                                                                tasklist
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                • Enumerates processes with tasklist
                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                PID:6124
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                                                                                                findstr /I "opssvc wrsa"
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                PID:6132
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\tasklist.exe
                                                                                                                                                                                                                                tasklist
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                • Enumerates processes with tasklist
                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                PID:3900
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                                                                                                findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                PID:3744
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                cmd /c md 815951
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                PID:5156
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                                cmd /c copy /b ..\Reporting + ..\One + ..\Liable + ..\Code + ..\Cashiers + ..\Est W
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                PID:5172
                                                                                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\815951\Screenshot.com
                                                                                                                                                                                                                                Screenshot.com W
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                • Executes dropped EXE
                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                                • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                                PID:5188
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\choice.exe
                                                                                                                                                                                                                                choice /d y /t 5
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                                PID:5204
                                                                                                                                                                                                                          • C:\Windows\system32\taskmgr.exe
                                                                                                                                                                                                                            "C:\Windows\system32\taskmgr.exe" /7
                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                            • Checks SCSI registry key(s)
                                                                                                                                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                            • Suspicious use of FindShellTrayWindow
                                                                                                                                                                                                                            • Suspicious use of SendNotifyMessage
                                                                                                                                                                                                                            PID:4108
                                                                                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 5024 -ip 5024
                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                              PID:2684
                                                                                                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 2024 -ip 2024
                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                PID:3628
                                                                                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 5816 -ip 5816
                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                  PID:3592
                                                                                                                                                                                                                                • C:\Users\Admin\Downloads\YouAreAnIdiot.exe
                                                                                                                                                                                                                                  "C:\Users\Admin\Downloads\YouAreAnIdiot.exe"
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                    PID:1168
                                                                                                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 1240
                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                      • Program crash
                                                                                                                                                                                                                                      PID:752
                                                                                                                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 380 -p 1168 -ip 1168
                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                      PID:5904
                                                                                                                                                                                                                                    • C:\Users\Admin\Downloads\YouAreAnIdiot.exe
                                                                                                                                                                                                                                      "C:\Users\Admin\Downloads\YouAreAnIdiot.exe"
                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                        PID:3088
                                                                                                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 1228
                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                          • Program crash
                                                                                                                                                                                                                                          PID:2904
                                                                                                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 3088 -ip 3088
                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                          PID:5580
                                                                                                                                                                                                                                        • C:\Windows\system32\LogonUI.exe
                                                                                                                                                                                                                                          "LogonUI.exe" /flags:0x4 /state0:0xa3978855 /state1:0x41c64e6d
                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                            PID:2924

                                                                                                                                                                                                                                          Network

                                                                                                                                                                                                                                          MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                          Replay Monitor

                                                                                                                                                                                                                                          Loading Replay Monitor...

                                                                                                                                                                                                                                          Downloads

                                                                                                                                                                                                                                          • C:\1.R5A

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            380KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            d0d34108c179e739f51dd91da6b923e5

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            a7d2934e7267fa793eda54074423d26556ff658c

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            b45ab16bc3e65752837843fd019544daee3cb6ce8ba4c2795b3aecabc5f2349a

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            fbbd213ea035bc40cb1bab794321c9fda376435148e04c8b51c26c4b8f018f9c7938ec035336cfa76c896e506ea2a8da5d0bb8e59db0a2274e7b46cbb6ca860b

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            152B

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            7b19b7ecb6ee133c2ff01f7888eae612

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            a592cab7e180cc5c9ac7f4098a3c8c35b89f8253

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            972bc0df18e9a9438dbc5763e29916a24b7e4f15415641230c900b6281515e78

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            16301409fee3a129612cfe7bdb96b010d3da39124aa88b2d111f18d5ae5d4fc8c3c663809148dd07c7f3cd37bb78bd71e25be1584bd2d0bacf529fa7f3461fd8

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            152B

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            23fa82e121d8f73e1416906076e9a963

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            b4666301311a7ccaabbad363cd1dec06f8541da4

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            5fd39927e65645635ebd716dd0aef59e64aacd4b9a6c896328b5b23b6c75159e

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            64920d7d818031469edff5619c00a06e5a2320bc08b3a8a6cd288c75d2a470f8c188c694046d149fa622cbb40b1f8bf572ac3d6dfc59b62a4638341ccb467dcf

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000003

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            47KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            0d89f546ebdd5c3eaa275ff1f898174a

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            339ab928a1a5699b3b0c74087baa3ea08ecd59f5

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            939eb90252495d3af66d9ec34c799a5f1b0fc10422a150cf57fc0cd302865a3e

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            26edc1659325b1c5cf6e3f3cd9a38cd696f67c4a7c2d91a5839e8dcbb64c4f8e9ce3222e0f69d860d088c4be01b69da676bdc4517de141f8b551774909c30690

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000004

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            67KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            69df804d05f8b29a88278b7d582dd279

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            d9560905612cf656d5dd0e741172fb4cd9c60688

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            b885987a52236f56ce7a5ca18b18533e64f62ab64eb14050ede93c93b5bd5608

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            0ef49eeeeb463da832f7d5b11f6418baa65963de62c00e71d847183e0035be03e63c097103d30329582fe806d246e3c0e3ecab8b2498799abbb21d8b7febdc0e

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000005

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            64KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            d6b36c7d4b06f140f860ddc91a4c659c

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            ccf16571637b8d3e4c9423688c5bd06167bfb9e9

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            34013d7f3f0186a612bef84f2984e2767b32c9e1940df54b01d5bd6789f59e92

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            2a9dd9352298ec7d1b439033b57ee9a390c373eeb8502f7f36d6826e6dd3e447b8ffd4be4f275d51481ef9a6ac2c2d97ef98f3f9d36a5a971275bf6cee48e487

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000006

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            19KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            1bd4ae71ef8e69ad4b5ffd8dc7d2dcb5

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            6dd8803e59949c985d6a9df2f26c833041a5178c

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            af18b3681e8e2a1e8dc34c2aa60530dc8d8a9258c4d562cbe20c898d5de98725

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            b3ff083b669aca75549396250e05344ba2f1c021468589f2bd6f1b977b7f11df00f958bbbd22f07708b5d30d0260f39d8de57e75382b3ab8e78a2c41ef428863

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000007

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            65KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            56d57bc655526551f217536f19195495

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            28b430886d1220855a805d78dc5d6414aeee6995

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            f12de7e272171cda36389813df4ba68eb2b8b23c58e515391614284e7b03c4d4

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            7814c60dc377e400bbbcc2000e48b617e577a21045a0f5c79af163faa0087c6203d9f667e531bbb049c9bd8fb296678e6a5cdcad149498d7f22ffa11236b51cb

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00000a

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            26KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            5dea626a3a08cc0f2676427e427eb467

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            ad21ac31d0bbdee76eb909484277421630ea2dbd

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            b19581c0e86b74b904a2b3a418040957a12e9b5ae6a8de07787d8bb0e4324ed6

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            118016178abe2c714636232edc1e289a37442cc12914b5e067396803aa321ceaec3bcfd4684def47a95274bb0efd72ca6b2d7bc27bb93467984b84bc57931fcc

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            48B

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            5f7df08480044bd333a6dff22ef518d2

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            3e73ac24d720a4b8a5549602eabb75856f6e0e0e

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            b98c7a43a33210eea7abfe8c85e48cc75d102a64fef62997e326ffbc9acc2536

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            ea5d7f83b5fa7f48f04adbf51fda9aa5e60a84d39b203fd5ccda1acf8319e31c32750cb157bf35bc7b74f5a21db7f46b02049a410825b6bd54e326d66e2b904c

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            1KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            ec3ff740958a4e7d4e63bd7448d2f0b5

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            f555df06d3618215446f5ba021d730df2ffeda92

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            86a59a65fdef4ef1730903dda6b7aea94f4ff7e4c8a7d835bfe78bfd0db8afc9

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            909dd66a95976d258d73d9d5f68a36e06ec6b0d2a53487297de004aff1a997eb57673c3bb87025e073337de730087842ec562bf9671d9d661b6923d1146cd053

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            3KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            31aa61012ac707e2cb9732ed9f94a01e

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            6b843203a2192b1d2d74a4e85550ceccc3bf0b2b

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            42b256043448dad16eb5fd346be10fdf646b87684fa6a4131b8b9216e70a74fa

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            de2f37032ffd328ca19127322c04375ce8214d73b64b885c8eb4268edd96490974f05c9c45f6ca5613333076b587f2ab46ee672a2e6557448f21aa063c7632c0

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.ico

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            70KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            e5e3377341056643b0494b6842c0b544

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            d53fd8e256ec9d5cef8ef5387872e544a2df9108

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            83f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            1KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            9e55adcedd1fd2b6310a7d499309e50e

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            f680689b3225dee3d7f86286b32b229e46c42c7d

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            f47ac3190535d7671efefd79a82376f2a830337451d395b23bf8dfa151d70a2a

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            58ceb477dd7cafb3cd62386cbd56465f4444307b62818659b65a225f01d9d9e537053b294e786f73b0262d9980662edb5c8aab4a14c7c1ffbcfb67e62fda8ab9

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            539B

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            c0d6f3776ad176ec6f6ebeb5a5f54855

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            9108a1331dc1c46e32899000793206389007b911

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            f9cf713cf66cbc94d3cabea3e7b82563a61801e10029c873d03a9e90823497a8

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            a8301ebcffc2cbc190283f90ddd3caaaeefb718a05da562fd3c69757b3fe8ff0ae23ea6a23d9db6cb109f7d3aa24a23f42eb11c98d775ef391ec2a77554f1626

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            1KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            7ac819023a0b5d173e21ce906b930bdf

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            70c76ce6b5872000b4052f3c793105bdb3351531

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            babc40bffc4fbf985d7dffa331ad9f77f80a01997d4c459bfbbd8930de17c02b

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            7b1f8b0d6b75e387cbfca1cb077820da954ad7730720ea78e866f70b9d4c4b2fec8a4a628f715e737b72effff47deb9df6dcd10d7a6fc182e14123464b14a332

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State~RFe5db912.TMP

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            59B

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            2800881c775077e1c4b6e06bf4676de4

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            2873631068c8b3b9495638c865915be822442c8b

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            6KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            b1003ba5aac50c8527adb17143140f59

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            6f6cf2d576ea73c104cd255537379418554d5afa

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            fbcfe5eb864651484668cde528464fc8fde74fd50bb2c3e5ab479dbf3d4c38b7

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            55f2bb4c9e56d2f6e19a139782bfca95ae0eec78bbb4842e7150f8e4f868e656d970d8996b6cbc8c965946850b33d190fcf6efef5de939590e631062732ba019

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            6KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            3e199fe9daf4bf717c7c070c5e9a7a99

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            ec8b739a2362e9467c9ebd18f9368a54387404b7

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            32674bc5d72bb948fcb2a1d15927bb0fd1c65a17dc17b74baa7a00b47a56f9fc

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            5e45b506379eb738906780c9f0e29ec19ff074757ab924767216cc475af2716bc58625f73938332f90891f2c956fda7268e374d806d3b21227c13d7a8ccfb197

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            5KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            0e7f620179ea03f17080d9c885751e27

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            a06b5c7f0d6e8c22c57f33b7c03f447d4959d0aa

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            4677283db2c2b852ceb2eaafeb29b630bee317226762cae466f843444d2ed936

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            4be42a3cabe6a62440ba377381210df1efa4dc1f3345ee0fee4a029010583cfe7c765573438c75164951af6d4aaf2b136b8fb6b49ff35f5aaa5a719533028980

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            5KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            9f2419c073f6313b0a837ede591dfa18

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            c055fe988f64fe9d521ef32c98ba816b8a214ba2

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            9151625671b9a2d28b13dbea97f5687738c3e189f60bcb9f0ad5874f4ef69034

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            5cdc8f5824a8bcef69eb82d0818f916f3bedbd5a725e24c0d3468447909a06ef82e0e95394db26144bf37327184e9fdc26522923ff3c0b36ea7a90ffff501097

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            6KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            3fd610c0c5a370631005642c6fa0297e

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            b581f9dfc2d714be06d6a39a57e0ab976063f3af

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            a1f597f35751902a5248e67e4d25b90f49b344ebedfe41e404601014f7697fb3

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            a2daa639b991fdca58353a69ec7c18bf1ec13d269c6e711ed06c08c7be4f5ceb5c9a4005e4701799b1b6206c4ce827b60156c9009bfc2d289c5cb3f0e7328a67

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            6KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            706c1f39a7a48ae507fe426417a73729

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            fcfcb30487d21da1ef7dbf6634e9865f20e4ccbd

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            732c83d06efb219051af44132578bd1a2a98a53c1651543fdef17973f8391e61

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            e12c7a74bcfbb7ea45b52d20ead3e1495dc69a2137e0a56b86fcc5a52b52fc0349060e56559b1e1070186384dfad49dd65706a43a106e761fac96ee9990f4abc

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            6KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            0f796f7d3bfbf0937ca372e9285bb69c

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            65cf68cb480ec75d782b99fb63b76f21f3c18fe5

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            15b2f8697cc2433fcce393a39a69f6d164d14c783b8d21131a9db63f4eccfdf1

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            589217159d7812734b90d62269f85f775131aebe56af54f75990df0aed42305b14eb7ed7ed2b226f2fa04710ec3b93ae1122dd3068ec0576628c127708655c17

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            6KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            b1e9844a8bede1ae8c452079c2fe5765

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            7689bfda2865e8c5660011e427c1f89229599379

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            6677043f327114307861940459dcfead54d08af236aa526884537bcca5e92afc

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            08deca1a7a05cb01b04d90fbb17a2eb57f4a85bfeabbac4edbc7ed391eea4bb8232c1501b1bd0ffec58f47dae2fd04971bf747c4eef4cd490dce8a798fab53be

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            5KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            ee65c2a8a781fcc9d22fa61253ad1d9d

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            70e27c61026a0ed548e24d27f0f3062c58051d41

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            f38aefc90a0370296685abe68d645cfe7e9eb4ea285f2d4c8ab2b2a54f1b9d90

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            7612dfdecbc60f3e2cfc24884213caa670247ae68e03a86458524cbdd12d6793ff6cf765d1bf94b5d82de063d45363cedc2646920df19f965697da24fdf74768

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            5KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            4e927e7e2eb54d42135307b64e9d7f6a

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            277bc3986b967964136ec2d9892eeb075f7b6cae

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            4ed660d34c65260b88988d123533c3410b4b79dd17cdfd98f4e236ef9e035e98

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            4dd5b6552f7fd2a6db69ec503d785882ec569111140d4bb5f1357ad0d412ec8b2b457d88bf457d9d7ec9a5c928f66d08a7bd52b9e10ef00ecdb55bfe1fb9c73a

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            7KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            289fc10252abcfe6a97ba8c982850264

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            f9366a834889654412d193a1a11af1058dd22ae7

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            b4512578ffa4dfbaf288a1fe55ba26c55ca7f4e516ac9de275ddbc9678862707

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            bfff60d5a7e80803ef64d2e76efc9fcec3852bef16c6b15f27769a1c5b53c2b0f8f650024285fdc0782339fd288e63871bb90b94dba6742078c99a5bb668406b

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            24KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            371edf34cc4edfe5fc16d906571e1a49

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            2b0f160569aff513f7ac25a16adf02758cca07fc

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            ee07b7e150c132312f076f2fe4c58445fcf86aea9eda0468b6ee040b5f690d35

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            9598bca019b2acf65bc0511062e8edf53e00b3801d7a9b49f9c6b7209bcf7ff782ec215716955d5f378f952d77435bccf210384909f28bffa83fa9ac8589cdb7

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            24KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            8cd513127214e252edf0454f329bc002

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            6f47fac6be8e7331e54203a7865e86b32cddf16b

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            3df220380a8bf881117c17102a5c70ae7deea18ec92e7c478df2ee904d882108

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            0b6d2f2e12bb8b15175875b7118778e57475934dee0476bc3ec989c5408d1ff5cf1c2d5dce4bd980a3ef9bfee232f974fa90050171826f3f0847f9682ae7e4c9

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            1KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            b36e12ed9224e2b6da368cd68d505a9c

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            65a11ce79721880286d501f51e5386245c4c0d64

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            80e4b7ee9834c4bf88d514eac1e803fec0afd65baef1442896034e26dbcf900c

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            c3cda7e0f201902d4dae5dd7ad00ff28dd6a4b63b35f5a0a89227ba8e038761b059d5001485ffce73d31ec5420cee1a6ae91837f2f5865ee6b1e341c20e04af4

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            538B

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            e1b89abf08ff8d5dbbf4a0083824ef99

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            5be66a4496f57c2d8d937ffe57c9ebc73ddd51e5

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            780e9b2431a7ce4cf2ab79632b14dade8924ddb004788902e29abb2414c3d525

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            28c0990c9ce33c75a69ecd0a34cf1528f5ca66517a9e0a282c202280671b15f32ba168de84ad31a1b2cd4e6a2531227b4084a14aeff0d3111c1a9b8b2fbc4015

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            1KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            e514ec3f74cdd9045f66eb0b7bc8c632

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            40bf7b364e9d0cbf263acadb21d49abd20227926

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            9d8608db3ed77529d1ac4398d208e531882897ca6c900ad7b0dd0f9aed2f0f22

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            73e73318cb0dddde2b6b59fe0c010924bf551fb4386d5f5863fe41ae7cdbf7995e81373e70b1cadee6ec6f6d7128ec2154df2c72da5dd54c8b569e5677a777bf

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            1KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            217f012f57da6b6e231f95d751106d89

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            3243fa3336b05e435df57a9ebb4c68a7306dae0c

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            85a6a977556baca0e49774300439b9a09534f7350b82442e013e5262328b4e9d

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            6dd2b62ebb09e326f03892c5c0ca63063f4f228024edba9f7b856a8a154f76e636eaebbf0f8b1931e7f72d57706033c0bcccfc4ffdb4bfcd54e9548a4da35fbb

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            1KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            8ec281d5c24fd035cf16f576d93cb144

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            b2fadbd1ff38ad32c33dd7459e926a951aafc109

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            23ca231740c8e4ddb2c4570c243bcdcfca0a0465f0732be89eed6d8539d1d2f8

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            d590818388e6784f62983c63c4907db3804311a675f47683ea3a1a5ad9ed4f8b17aca8e009d0ba5807c5c04bbadb98ec1af4446bced1a8b4ea007436e9958205

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            1KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            c59b4832401e52aa512fc67d1cc32e20

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            1ebafbb325c9e9ab203038005a1048f121583cfd

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            afc1eec0f1141eeeab5980167914acda5b2dfc3fc0e8a2eb5358e44dfcb04183

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            9fc873158a18b7653ff6122395dc65061fa13a3b136f6fb853174ddc2e6038b6148be380bc1116f2612e94aa3e19a2d070b84f9e1ab0f559f0730ba838a00b9c

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            1KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            7adc0176380f9fe5f53439daad1bf76c

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            13f83c9e6feeb1231c9ec53f96247ed9f913d5a5

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            48c6caad16418aa097b1a5b9fce03809d06febc82c6c35b58ac6447e705b195b

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            2acf2a030a5c9de1f412c8716bc131189f12973f85785e0d8d0787c29a6c8b8c96e29786ee60590c06d8b35ade51e3ce2e8b87406cca3d886b56411287d67c0f

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            1KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            9d30c862663d3bfa3d564d80989dcbcd

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            4201d5d432cb11bb649aab4810b341976a510075

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            deaa9b45a49b1c5f26351059017809187a61b56d1156bfb0c1db483608586b0a

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            f6d2174fa4c2e4bbcdacba11e37bd08a2eea90c272c5633bf36a33c59003457c02454c76649415e362b5b164aef95b616ce755f3a945ed1a501ce700b53a2993

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            1KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            cd7e1ee8ac5898efc8be323e8bd2be62

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            9803d4febc9fe046d53f1897f86cbf7f4d711f57

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            5ceb6b42260e77e2f1f3a7886dc981a2b74f395ee4e3b18db3aaf246b4e52ba2

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            493dd751d42a33f0a8a3011f3e06d461d949efccf39ad728762d2b3e41a4c28a9546d24566add12dcbce557f63024260d4ba81062a1781ef521d420dfc90b72e

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            1KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            047fc097f76876536960bc74393f1e10

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            ffedb2a24b3926e1fdc18f12418d913fad41016c

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            e8bc1ed5af1bfa0d10858a5fb98163ce7d32e63eca4c2a24cdea8b2e4464f850

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            34fc33eaf158d31bd7c20b051710fcd1afaa0f216b05420464a360a014c6c6a5163da0b874993340216a3c4bfdc225bc8dc29d05a8a29737a1231c1f5111ed37

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            1KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            d4992705376c0e08d05a13a60a2e777d

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            9bd4e81ac00404879b6430fba8edacd24712ebc5

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            099487c642cc13745d8f795805ed56cff8d8ad9ac7b1d4c3d053516f1532ded3

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            abd653b6d0ef7fee17d9296aafef3c562c5f4a9c9876c7c4ecdd9ebbf8f0664be98d03ce030e08b62f11a900764312239ea08ddfd8b3456d2bd368c39d859983

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            1KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            e66ed02628dfdab62c3fa3d3363f0f16

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            2236279a34a988e9f27a34d8b00f35b323d88d1e

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            34878b826e13ab0df0fd53914aa8785af585f861a4988d2de6bec56fb1b1021d

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            18fe305ab5c7e77135fa2ad6ec04b609d778c47199d53f901e8f2eb30807775322c0ead043f7b40a8131d5469eb2354952e76bdacb1252191f6c537f0474aad6

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            1KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            2f15e6b220402eb33444231277ac2e80

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            f847fa90d87c80c773f46361447b3f305674ffc0

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            0a85fa9569c1b806ba1edfdb9dc40f57102679a01d523290c1bd1661f545bfc3

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            5c3454918d10fcac09a3a94104929418b0b59dffff31464cfae63321f94739987db9cbe11295fe838673a2e386b5cc90a026bb274550dd8c02ddaedb690f3418

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe5d67d5.TMP

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            538B

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            dd6dcf4e2765b512e1b4959e05aa2e31

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            fc59d34fd886035a034f7a1082de628146c7f1b2

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            b01c15c4c6fc6403afe79de2cda5a0bf5e8b7c10f6e65a6717ae3c5ec421e8e0

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            5d2861be8d61c51118db4ed0a027f88cb146c6bbe684765b5c4c9358f5b78ca1f12a2026204f24f773431cc633db56d324f9d59b4481bf52a22b01403d1423e8

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            16B

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            206702161f94c5cd39fadd03f4014d98

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\MANIFEST-000001

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            41B

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            5af87dfd673ba2115e2fcf5cfdb727ab

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            d5b5bbf396dc291274584ef71f444f420b6056f1

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\CURRENT

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            16B

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            46295cac801e5d4857d09837238a6394

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            11KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            f525412cbacafc0066abc7f1c1a2c5ab

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            928d6923b08d4695ba92c4d89dcc0db8fcec435d

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            f7f49e911c6d711aefa999a18d6a8a0702733911a7f9b937ff01f647909cfe95

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            8bda49fed6dedd0251c9622c1986112bc779b01ac271cdba3bc39781c2a7855713ca3571ccbb6f9bd2f38bb9e4b9ab30521370f9efb8f779f468d7ff4e328a6d

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            8KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            d4db1a03f72c19f3cc64129edb44e972

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            bdc8f469856a4f9912fda75d645b64de55800fdf

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            e100073f73f75473d7f8d2fcd1dbbe80bbd1a8751b14f28c058c827868104eda

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            16368b9b6e34e3ddc33bdac9283562fabc96d9b8bd7030b0719488b7308c065c0e018b8ce4d58fac309465746bda6d29b63a051d18d145d349e92fa8be147560

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            10KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            aaab3cd0802819677f09998c404d2cd8

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            70791976eea070fb8601e0705b8b55648baa8370

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            850be5081c4200375e81cba623610117e0c804b5d6209f1d8b4b1b0c5f947166

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            800e2870352bc3cb92c39702a26947849df1051dee4b2ba192ee2fde421fad8db2518e2f8fec7cf8f03ce47e9cca1fee16f8e272961e40f25adc8e5250fc2e4c

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            11KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            cecbca816a88fcae21c4f5e409c8aa12

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            9c016f3dce726ed937aa7a77042931a5016024a4

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            038a233f246bb28ff27c4a76c1a1af81ea42cfcc5cdb14c8e90ee305d3381937

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            fa0afed1c0baad80ed93db55f223209764dcd64953493b72d3026feb04bbc7182614a238d051f259a7d79ceccc406efc69bc224d10ded5a462c40e78c061cf06

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            11KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            f448065a8fd472f990b6e4c0e84f496f

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            2d9e360a8a93d75c4942b6cbfc5a153082d60e15

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            71f13f136112d14c0cb25084f9c7bf788be6af6443ee5d9ec6b16e35bd2d4e29

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            1695b4645591f9dffae9f81d2b031bec97112be843287851f9453865b4248d83b2a0bc491b04d64934b161d0816de59a4a672c7b7c8692c588c0b508c861efff

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            11KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            809fefb1f74394055add8621ba10716e

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            633ce0fbe2211fa4b835e6d97944a341c0488e79

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            5e710b4c2e3d41cb314dcdd1e745863e89b7f12ebfb7e8567c57868ae4af5f52

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            a1c231e406781a5b61c5a06fc00cb4bd59938873a72f2f914858f77772f43135f9a8d6bc273801c4204727ee80af962fd0aa96e693b5f6d53f0497ea655404a4

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Brighton

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            69KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            800140c62a1caf6d4a5b5be20d691a4f

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            29f90b42aa74869c7bd49080113b130607afdeac

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            f62c6cc265289d67940bf1161e9995914f86a8ee946c58002950c14b93f601a8

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            c4387cef40f37235d0b2838b54d699bd7d3af2695bfb762d060cb4798de74beb3ba947bf45e54b150b0a37f82bc73fd735a2c19ea83a2789505adc8831c8a975

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Calcium

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            27KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            8587422c8aa5c693ab7cbe6aa164b417

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            3bc48c54608184c6b339d1dfba60466bfa975c73

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            fe0ee756f14547fbadef9670e7fd02e4c220be42747387cfea5a17775e83b592

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            9c646fee69377c60fec82898fc1895709859a60002b942da2ec630b682fbbe884620c91e12a7e41816c2cb334ef76ce4288510a9ebf66cf252db205bf6c85fa8

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Cashiers

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            83KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            5f44eb5c967657c9e86a134105238d6f

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            2efbfb0a6b70319fe7269c336386f7f8f5060090

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            1388116ae9de3e7a702d7651c741cc250c0d8bc513186f0238f901f5de0afa32

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            55b5f4d6f36be14cb85008ac9ebd2d9ee43c7ca489b1424f9f6ec9c8984ac36681dc7926a80b0e284790f0bc6ac40f865bad577f52780d0fda9954348b224e97

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Code

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            77KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            f50faed04bb66633f487ecbbf9882f1a

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            33b5c854be7b257fe4778529af8252a36eae0783

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            3c73c485a78f02f83ab20c574f9b7324403e2f73baf7196e620d80f833a09935

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            a80ecf948acbb3cfb955b2867fd64b48753ef6f2d2cda1bbcc44f623386335d53a2e5e1139ca8862d8d622e8baed9edf765943f39885ba1e3f4679d7f753fe9d

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Creativity

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            68KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            f76b3aab3f4536944f47803479831108

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            6a5ff98adad0d860549e1effa682ca7cfd53b783

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            989ae9ef2f69e9c8f2f9637466ab4f093444e367bbd1e302965214f8ff09f372

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            f04c24f84971a620170c438db4082438b03ec69fa4c63496c9eb66b08560d4cb6a9b2f5d419312750b30b7538f6146ce3e040df2f2c800640d1ac2ca96390d27

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Creativity

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            69KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            cf613611fa89066fd411ca0c4e1361d5

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            0a5b25b7c43f642c40564151592899e3f177200f

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            2c8683467184336a78826746c6bc94bbaf341e6f88333585f437814d341267ef

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            62911f5985412766e7434f43e69e56d7a4001dbf38189632aef2b2fa241f5d86c6a58af7516c723bcd45ae55264898956f701aa5374665c85278fbbc380c489a

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Deserve

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            95KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            c11fd721f9baeb3c3a65d1cdc06602a2

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            d46fad5366ffb57f76813d66e29b69485b63cf99

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            8b89ba3dba13b04cef436f293b6faad38f587df53d397da5819f1513c9eacf5c

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            732ed874c7fd749e9a7dbfa3c09df7cac2b2ae1dd0479247e64c23286f04fba6af34ba571f17fe9b6d39385464c40353af06bd1bdf5205f294a75802d3954fab

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Discussions

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            135KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            6d6e95f0dbbb9f66abddb10382efd635

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            a587b9814f60f9ad623524611ba0440626f34b23

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            10d1a00fe863cab334823510e60fa05effecdec9d86488b0bd2d35d0567f35cb

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            0afedbbc9759738c43320b602a3ec279c75a160f108461449b91ecff1e07a9ef0d25da26d30656da8ccaad3270ef56bd86cd21f09db78698951e607d960fb62f

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Est

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            191B

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            c6f5a3e8d97de9a6c09b3d12ff05e873

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            587b7fc38e4757fc26c680809dd52a7faea7ef34

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            b5419ec8ebc587f6a3f85bbfcf7ae6173f537d1dfb36bf13e27d75e9aec82ef8

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            a936a2dd04bc4fab1943155fe14d948cac1189392ae58eda14b59f3f3751230a21f469e62dc43bb346a8eb12377539f6a342e6743e64a9469a21f9480d9a73de

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Home

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            19KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            aa9ed7eb65a3263d1eb232c545b8199c

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            69f80c16dc6627460683a4b65daeb9b67f1acb79

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            9223a214b97eb5ec5ddb48c4810f350c137a419951170d6b51355f8a6d6d9623

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            3129f53caa524b5e44ca00e3a05b64798209b01d0ba150037dba62aed1675ca9301c38ee5524214cfc3ebbbd075e93868c4f224fd506d430a55dd94bb740ee03

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Home

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            31KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            14c374994e755a90441f2acba7dad3ee

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            947dc6e8ef6d2d4c6b9b465ae3b0767da6c744cc

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            e8abbfefafc93f3ea0be9b89d7e5a3d51d4cb2c9b42141f57a195c71abdf1504

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            63e2ec5caef1e188fba196e1cc6c3767e5f0dce2e3e9cea3e57917eee0407cf912f9514758949c97e7039979bae84d9b71c2782a6dec4a4929ac007cc86002a3

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Installing

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            72KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            b82d000da85f5b875ec154d9f9359df6

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            9da4547abd37417ba3b00d4374144f24e75d3c1e

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            5137712b0bdaa8857b9d5862ef8f8d3375518600a1caedb5ddcb4565404f8150

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            6f7f980ee8d74cef2dac9b742dc3607ff740a113252e8a423b6cced99f279d0ed382e3ce5d5fc01dc45f70ebe00704554f134bcab57700b83c6aab65e38f7197

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Liable

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            63KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            3963c82707e90126e454a170693a7239

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            edca4c7db2ecaea5e458b58f9ddbfd4d9340a442

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            245ab548d12bac2b67a5925202bc690d5752ac65fb9b54f8d74cd8dc619babee

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            6d1a2c31927f6741a0f04304e3d4cd20747e0b42c54818d7b7b77ae5749b439ec79e7266124e364ec7a835b6246214297325d6fea0bb565b9936cbb58cd554d1

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\One

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            99KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            178873173ce0a535a170b60e2739886e

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            b3213cca7bee1d8a50b34664f56ac19c182884c6

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            01e1c1069ef37e08995b4ed04ba634b1d110f8dc3cf51cb7c17dce10ec492f06

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            bd424a53c440e090aedd536f82c9eb478ff04756a5cc2da6fc7c15aa981e413b8254d5a2e1d9b9969852aa35d214c18ec60a3d820f52d8c30e84dbd77f8173ec

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Pas

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            87KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            f5cafb3ca1193320e8867439b6e80908

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            41593b9ca73ff489415e2fa00cef36a8a2d63f58

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            b800fabb812ea2dcaecaf176f80e94bcaf328eb42921616813a6e20fbca4173b

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            c0183cf3f6b0f3f74382304507b66ef8c6539d2622d7c50d598ca51f7e580788c03385de764e60728c095d84c07cf5ca32f96215fdcbc1d23fb49c5536114587

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Passed

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            109B

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            f63b2f6807453b1e0ad2a4ea71f1a3db

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            af4b2dc8dafa90ce3ced9db36abf15fc7d0e028f

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            88a19af86dd136e5b7af3f7e54089493d7b1d28c795cf87592ca81f7073ef0b3

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            b8aa7550285d1141d8a13708d0130e5f26b257b03944e316a641f498c69dea7f1bc1e2164709d7e9ff7096663a36342cc74c9081ebdec3617575128233209036

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Reporting

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            74KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            43437fcfcc247a530b3182d3569af041

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            4fe39e9165b5f4cabee2c59fa77c445486945ff6

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            131ea271c41ce04edcdcb1f43d3cc4ab73f89285666faf2ced1b55a196b95093

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            df8cfe98f88df119e36e369c9ca2f2a77978d45ca5d4f723d28ab47126e8cd5545c09716a4f68dfff9830ec509f536836c41281fb0a30ec6ae2e43557ef782ce

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Shareholders

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            141KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            65b2254d334faef1e0099c76f0834b9d

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            fcf1a5a421461ef60d0d016d0142944b8fde3f6a

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            1e4319ba9a0b61b658d704269d5d16549c4e539a7d3ed411dc7a11d90e2974c7

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            33c4e33b61d3de75d0620171f9ab4d67776dea0118414c814b63484f3750564b73d55a9fe9e53c6035dd575b56d96285767c7846414c9cea4fd99ceec3b39428

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Some

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            129KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            62065881c20070b99f076d38b592488f

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            8f601093f9e0f6e8e4d109cecbeb0d8f01bea125

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            7b896bd69d6476634adae5ce23383a7eaadb7722ea1f286e61b31c0ad0343a98

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            6441c7bc74e6a6d4c901a8c510313753fccab57753334a37072789e5327ea00994a58913be9d816d418143e70b7c163d82a77816fbcbc3c38bcaeefad02d9ca0

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Terrorist

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            96KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            463ac359dd04e261dbd8ac4c3158184a

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            ebc1ba3bf2380173ff1c86a91f16449efdecceb9

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            3f625e3de2e2a09729cfd8b98d27278d8dbb74ef4dd5337e912ac13ee324fb36

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            b23abc19245477b7171f1b295caf8947aa3029e0aa2dce6d46e0301897e64413ebc5b1eb4da1e7f8082db85d0a3315dd389e33e640d9dc7b5a33ced6b8553202

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Terrorist

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            85KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            87b80a789ad9f89ae755c76b00a587b9

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            a7c86392493a54bacf6b2ef3daa68993478d6de2

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            d49bd7dcb97a3e0ba971b4c2f5f4fb2728b748a7ba79eb895d1c5ae0a12d253a

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            b74ae8047740e5cba17a5f8ef27bceea8a0239ba0f3181ff76a85ab694a8bf537920dac2235f02f3df8f061da184a8a5ab66c2b4219d206093ca4db39915a08b

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            3KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            1103b362ecf40f2ee006f808aa42aac9

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            e933721360fb66913d2480ba62acd3c42a662b90

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            97a6234ad9846b9ad74c29e448b92c4c4cf8c7a33418c81aa77b6daa1d46c346

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            7c317b3c4ed091cb6b7345c4a159541e4614d342278b79bd1e48f657e1bd124dd9993880f0f684ae76f39110cf9c03636660f31cd8643bfb54c6b3863a5e2bd6

                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            3KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            47fa1c7dc4c140bac6355f9ae5bf0971

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            339385bb49c4ceeba7879dc6de0a3096c2b5871b

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            6fe5b13de2e63bcc8cec97d60cbb0e65fd294acc203a37bbef98142089a59ad9

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            4adb9cb0ac6f16dd09a886b867a185e73b7bbbab1066c9eebd28b82f13e71f5c660b559802f2c6e5908de5343b2dc3c4e9a7fe409628065ae105ce3b77cccdba

                                                                                                                                                                                                                                          • C:\Users\Admin\Downloads\Nicht bestÃĪtigt 426034.crdownload

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            1.5MB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            65d22eed9430388f478d259c13b91151

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            3fd6c1b050b7fda4c00b60960aafcaa1f2ac8199

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            a3a7d2d924f021a1c29dda0fbdf843d52ca294a0c0bf136e151002d34df92a18

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            0eeffbaf2ade4a66e9cd1a50eb954003693715bbeff76a2012d15930a164cc3f8176ba29163c13a95e52e4fbad0e9848e3bbd933e5519f803ce5277d7eee9d37

                                                                                                                                                                                                                                          • C:\Users\Admin\Downloads\Nicht bestÃĪtigt 486953.crdownload

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            32KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            eb9324121994e5e41f1738b5af8944b1

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            aa63c521b64602fa9c3a73dadd412fdaf181b690

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            2f1f93ede80502d153e301baf9b7f68e7c7a9344cfa90cfae396aac17e81ce5a

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            7f7a702ddec8d94cb2177b4736d94ec53e575be3dd2d610410cb3154ba9ad2936c98e0e72ed7ab5ebbcbe0329be0d9b20a3bcd84670a6d1c8d7e0a9a3056edd2

                                                                                                                                                                                                                                          • C:\Users\Admin\Downloads\Nicht bestÃĪtigt 561636.crdownload

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            315KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            9f8bc96c96d43ecb69f883388d228754

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            61ed25a706afa2f6684bb4d64f69c5fb29d20953

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            7d373ccb96d1dbb1856ef31afa87c2112a0c1795a796ab01cb154700288afec5

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            550a891c1059f58aa983138caf65a7ea9c326cb1b94c15f3e7594128f6e9f1295b9c2dbc0925637dba7c94e938083fffc6a63dc7c2e5b1e247679931cce505c6

                                                                                                                                                                                                                                          • C:\Users\Admin\Downloads\Nicht bestÃĪtigt 828175.crdownload

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            93ceffafe7bb69ec3f9b4a90908ece46

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            14c85fa8930f8bfbe1f9102a10f4b03d24a16d02

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            b87b48dcbf779b06c6ca6491cd31328cf840578d29a6327b7a44f9043ce1eb07

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            c1cb5f15e2487f42d57ae0fa340e29c677fe24b44c945615ef617d77c2737ce4227d5a571547714973d263ed0a69c8893b6c51e89409261cdbedff612339d144

                                                                                                                                                                                                                                          • C:\Users\Admin\Downloads\Nicht bestÃĪtigt 87632.crdownload

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            424KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            e263c5b306480143855655233f76dc5a

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            e7dcd6c23c72209ee5aa0890372de1ce52045815

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            1f69810b8fe71e30a8738278adf09dd982f7de0ab9891d296ce7ea61b3fa4f69

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            e95981eae02d0a8bf44493c64cca8b7e50023332e91d75164735a1d0e38138f358100c93633ff3a0652e1c12a5155cba77d81e01027422d7d5f71000eafb4113

                                                                                                                                                                                                                                          • C:\vcredist2010_x86.log-MSI_vc_red.msi.txt

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            395KB

                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                            3f106d19f4bcfa6b19b7ff2fe114adda

                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                            a63be262051076b5935e41f9a8ebb2f3597f420d

                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                            63152eb92b9a7d24b9abfb942b99a776c66dd68fd402c36ae32ef2b51568ce72

                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                            3b5701df797784a184a80e3f8c9355034ce2dfb785e5830af6c540e700e805eef6d089f151883639b21ce7b8a795c7f7f732f97d56328c30b1a54fac68fef3f0

                                                                                                                                                                                                                                          • memory/1164-1356-0x0000000005850000-0x00000000058A6000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            344KB

                                                                                                                                                                                                                                          • memory/4108-489-0x00000206240D0000-0x00000206240D1000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/4108-490-0x00000206240D0000-0x00000206240D1000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/4108-488-0x00000206240D0000-0x00000206240D1000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/4108-500-0x00000206240D0000-0x00000206240D1000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/4108-499-0x00000206240D0000-0x00000206240D1000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/4108-498-0x00000206240D0000-0x00000206240D1000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/4108-497-0x00000206240D0000-0x00000206240D1000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/4108-496-0x00000206240D0000-0x00000206240D1000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/4108-495-0x00000206240D0000-0x00000206240D1000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/4108-494-0x00000206240D0000-0x00000206240D1000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                          • memory/5024-1351-0x0000000000890000-0x0000000000902000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            456KB

                                                                                                                                                                                                                                          • memory/5024-1358-0x0000000006DE0000-0x0000000006DF2000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            72KB

                                                                                                                                                                                                                                          • memory/5024-1357-0x0000000006ED0000-0x0000000006FD4000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            1.0MB

                                                                                                                                                                                                                                          • memory/5024-1360-0x00000000071E0000-0x0000000007222000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            264KB

                                                                                                                                                                                                                                          • memory/5024-1355-0x0000000005340000-0x000000000534A000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            40KB

                                                                                                                                                                                                                                          • memory/5024-1354-0x0000000005440000-0x00000000054D2000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            584KB

                                                                                                                                                                                                                                          • memory/5024-1353-0x0000000005950000-0x0000000005EF6000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            5.6MB

                                                                                                                                                                                                                                          • memory/5024-1352-0x00000000052A0000-0x000000000533C000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            624KB

                                                                                                                                                                                                                                          • memory/5500-477-0x00000000041C0000-0x00000000043F9000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            2.2MB

                                                                                                                                                                                                                                          • memory/5500-481-0x00000000041C0000-0x00000000043F9000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            2.2MB

                                                                                                                                                                                                                                          • memory/5500-476-0x00000000041C0000-0x00000000043F9000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            2.2MB

                                                                                                                                                                                                                                          • memory/5500-513-0x00000000041C0000-0x00000000043F9000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            2.2MB

                                                                                                                                                                                                                                          • memory/5500-478-0x00000000041C0000-0x00000000043F9000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            2.2MB

                                                                                                                                                                                                                                          • memory/5500-479-0x00000000041C0000-0x00000000043F9000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            2.2MB

                                                                                                                                                                                                                                          • memory/5500-480-0x00000000041C0000-0x00000000043F9000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            2.2MB

                                                                                                                                                                                                                                          • memory/5500-514-0x00000000041C0000-0x00000000043F9000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            2.2MB

                                                                                                                                                                                                                                          • memory/5888-537-0x0000000004180000-0x00000000043B9000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            2.2MB

                                                                                                                                                                                                                                          • memory/5888-536-0x0000000004180000-0x00000000043B9000-memory.dmp

                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                            2.2MB