Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10Malware-1-...30.exe
windows10-ltsc 2021-x64
10Malware-1-...40.exe
windows10-ltsc 2021-x64
10Malware-1-...32.exe
windows10-ltsc 2021-x64
10Malware-1-.../5.exe
windows10-ltsc 2021-x64
3Malware-1-...91.exe
windows10-ltsc 2021-x64
10Malware-1-...ey.exe
windows10-ltsc 2021-x64
7Malware-1-...ad.exe
windows10-ltsc 2021-x64
3Malware-1-...ti.exe
windows10-ltsc 2021-x64
5Malware-1-...an.bat
windows10-ltsc 2021-x64
7Malware-1-...an.exe
windows10-ltsc 2021-x64
7Malware-1-...ve.bat
windows10-ltsc 2021-x64
7Malware-1-...ve.exe
windows10-ltsc 2021-x64
7Malware-1-...ya.exe
windows10-ltsc 2021-x64
Malware-1-...re.exe
windows10-ltsc 2021-x64
10Malware-1-...ry.exe
windows10-ltsc 2021-x64
Malware-1-...ck.exe
windows10-ltsc 2021-x64
3Malware-1-...he.exe
windows10-ltsc 2021-x64
10Malware-1-...op.exe
windows10-ltsc 2021-x64
7Malware-1-...rb.exe
windows10-ltsc 2021-x64
10Malware-1-...ue.exe
windows10-ltsc 2021-x64
1Malware-1-...ng.exe
windows10-ltsc 2021-x64
6Malware-1-...kt.bat
windows10-ltsc 2021-x64
7Malware-1-...o3.exe
windows10-ltsc 2021-x64
10Malware-1-...ey.exe
windows10-ltsc 2021-x64
10Malware-1-.../m.exe
windows10-ltsc 2021-x64
Malware-1-...o3.exe
windows10-ltsc 2021-x64
9Malware-1-...32.exe
windows10-ltsc 2021-x64
10Malware-1-...nf.exe
windows10-ltsc 2021-x64
10Malware-1-.../o.exe
windows10-ltsc 2021-x64
3Malware-1-...B8.exe
windows10-ltsc 2021-x64
10Malware-1-...ic.exe
windows10-ltsc 2021-x64
3Malware-1-...in.exe
windows10-ltsc 2021-x64
10Resubmissions
13/02/2025, 01:26
250213-btppra1pcz 1017/01/2025, 20:14
250117-yz7h3s1qfw 1017/01/2025, 20:12
250117-yy9l2sslcr 1017/01/2025, 17:25
250117-vy9p9sxpez 1017/01/2025, 17:21
250117-vw8eesyjfp 1017/01/2025, 14:16
250117-rk9ass1rhk 1017/01/2025, 14:12
250117-rhv1ds1lds 1016/01/2025, 12:52
250116-p4et7a1mez 10Analysis
-
max time kernel
890s -
max time network
908s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
16/01/2025, 12:52
Behavioral task
behavioral1
Sample
Malware-1-master/2530.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral2
Sample
Malware-1-master/2887140.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral3
Sample
Malware-1-master/32.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral4
Sample
Malware-1-master/5.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral5
Sample
Malware-1-master/96591.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral6
Sample
Malware-1-master/Amadey.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral7
Sample
Malware-1-master/Download.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral8
Sample
Malware-1-master/Illuminati.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral9
Sample
Malware-1-master/MEMZ-Clean.bat
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral10
Sample
Malware-1-master/MEMZ-Clean.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral11
Sample
Malware-1-master/MEMZ-Destructive.bat
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral12
Sample
Malware-1-master/MEMZ-Destructive.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral13
Sample
Malware-1-master/Petya.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral14
Sample
Malware-1-master/Software.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral15
Sample
Malware-1-master/WannaCry.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral16
Sample
Malware-1-master/Win32.EvilClusterFuck.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral17
Sample
Malware-1-master/apache.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral18
Sample
Malware-1-master/butterflyondesktop.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral19
Sample
Malware-1-master/crb.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral20
Sample
Malware-1-master/eternalblue.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral21
Sample
Malware-1-master/fear.png.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral22
Sample
Malware-1-master/getr3kt.bat
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral23
Sample
Malware-1-master/iimo3.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral24
Sample
Malware-1-master/jey.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral25
Sample
Malware-1-master/m.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral26
Sample
Malware-1-master/mo3.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral27
Sample
Malware-1-master/mo332.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral28
Sample
Malware-1-master/mysqlconf.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral29
Sample
Malware-1-master/o.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral30
Sample
Malware-1-master/qOA7iZJcoB8.exe
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral31
Sample
Malware-1-master/wintonic.exe
Resource
win10ltsc2021-20250113-en
General
-
Target
Malware-1-master/MEMZ-Destructive.exe
-
Size
14KB
-
MD5
19dbec50735b5f2a72d4199c4e184960
-
SHA1
6fed7732f7cb6f59743795b2ab154a3676f4c822
-
SHA256
a3d5715a81f2fbeb5f76c88c9c21eeee87142909716472f911ff6950c790c24d
-
SHA512
aa8a6bbb1ec516d5d5acf8be6863a4c6c5d754cee12b3d374c3a6acb393376806edc422f0ffb661c210e5b9485da88521e4a0956a4b7b08a5467cfaacd90591d
-
SSDEEP
192:sIvxdXSQeWSg9JJS/lcIEiwqZKBkDFR43xWTM3LHn8f26gyr6yfFCj3r:sMVSaSEglcIqq3agmLc+6gyWqFCj
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1898866115-3160784972-1217720036-1000\Control Panel\International\Geo\Nation MEMZ-Destructive.exe Key value queried \REGISTRY\USER\S-1-5-21-1898866115-3160784972-1217720036-1000\Control Panel\International\Geo\Nation MEMZ-Destructive.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 MEMZ-Destructive.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\devmgmt.msc mmc.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\b391ea2a-b274-4da5-8a25-9558c4a747e0.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20250116125432.pma setup.exe -
Drops file in Windows directory 55 IoCs
description ioc Process File created C:\Windows\INF\rawsilo.PNF mmc.exe File created C:\Windows\INF\wsdprint.PNF mmc.exe File created C:\Windows\INF\c_fssystemrecovery.PNF mmc.exe File created C:\Windows\INF\c_ucm.PNF mmc.exe File created C:\Windows\INF\c_sslaccel.PNF mmc.exe File created C:\Windows\INF\c_fscfsmetadataserver.PNF mmc.exe File created C:\Windows\INF\c_firmware.PNF mmc.exe File created C:\Windows\INF\c_fsvirtualization.PNF mmc.exe File created C:\Windows\INF\remoteposdrv.PNF mmc.exe File created C:\Windows\INF\ts_generic.PNF mmc.exe File created C:\Windows\INF\c_fshsm.PNF mmc.exe File created C:\Windows\INF\c_swcomponent.PNF mmc.exe File created C:\Windows\INF\c_apo.PNF mmc.exe File created C:\Windows\INF\c_fscontinuousbackup.PNF mmc.exe File created C:\Windows\INF\c_fsquotamgmt.PNF mmc.exe File created C:\Windows\INF\c_computeaccelerator.PNF mmc.exe File created C:\Windows\INF\c_display.PNF mmc.exe File created C:\Windows\INF\c_monitor.PNF mmc.exe File created C:\Windows\INF\c_processor.PNF mmc.exe File created C:\Windows\INF\c_fssystem.PNF mmc.exe File created C:\Windows\INF\c_fsphysicalquotamgmt.PNF mmc.exe File created C:\Windows\INF\c_cashdrawer.PNF mmc.exe File created C:\Windows\INF\c_fscopyprotection.PNF mmc.exe File created C:\Windows\INF\dc1-controller.PNF mmc.exe File created C:\Windows\INF\c_smrvolume.PNF mmc.exe File created C:\Windows\INF\c_fsundelete.PNF mmc.exe File created C:\Windows\INF\c_mcx.PNF mmc.exe File created C:\Windows\INF\oposdrv.PNF mmc.exe File created C:\Windows\INF\c_fsencryption.PNF mmc.exe File created C:\Windows\INF\c_barcodescanner.PNF mmc.exe File created C:\Windows\INF\c_volume.PNF mmc.exe File created C:\Windows\INF\c_netdriver.PNF mmc.exe File created C:\Windows\INF\c_fssecurityenhancer.PNF mmc.exe File created C:\Windows\INF\c_extension.PNF mmc.exe File created C:\Windows\INF\c_fsreplication.PNF mmc.exe File created C:\Windows\INF\c_fsantivirus.PNF mmc.exe File created C:\Windows\INF\c_receiptprinter.PNF mmc.exe File created C:\Windows\INF\c_fscompression.PNF mmc.exe File created C:\Windows\INF\digitalmediadevice.PNF mmc.exe File created C:\Windows\INF\c_smrdisk.PNF mmc.exe File created C:\Windows\INF\c_fsopenfilebackup.PNF mmc.exe File created C:\Windows\INF\c_media.PNF mmc.exe File created C:\Windows\INF\c_linedisplay.PNF mmc.exe File created C:\Windows\INF\c_proximity.PNF mmc.exe File created C:\Windows\INF\miradisp.PNF mmc.exe File created C:\Windows\INF\c_fscontentscreener.PNF mmc.exe File created C:\Windows\INF\c_scmvolume.PNF mmc.exe File created C:\Windows\INF\xusb22.PNF mmc.exe File created C:\Windows\INF\c_fsinfrastructure.PNF mmc.exe File created C:\Windows\INF\rdcameradriver.PNF mmc.exe File created C:\Windows\INF\c_scmdisk.PNF mmc.exe File created C:\Windows\INF\c_camera.PNF mmc.exe File created C:\Windows\INF\c_diskdrive.PNF mmc.exe File created C:\Windows\INF\c_fsactivitymonitor.PNF mmc.exe File created C:\Windows\INF\c_magneticstripereader.PNF mmc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MEMZ-Destructive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win32calc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wordpad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MEMZ-Destructive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win32calc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language calc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language calc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Checks SCSI registry key(s) 3 TTPs 23 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A\ mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 Taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A\ mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName mmc.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1898866115-3160784972-1217720036-1000_Classes\Local Settings calc.exe Key created \REGISTRY\USER\S-1-5-21-1898866115-3160784972-1217720036-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1898866115-3160784972-1217720036-1000_Classes\Local Settings calc.exe Key created \REGISTRY\USER\S-1-5-21-1898866115-3160784972-1217720036-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-1898866115-3160784972-1217720036-1000_Classes\Local Settings MEMZ-Destructive.exe -
Runs regedit.exe 4 IoCs
pid Process 8696 regedit.exe 7032 regedit.exe 9904 regedit.exe 7288 regedit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4484 MEMZ-Destructive.exe 4484 MEMZ-Destructive.exe 4484 MEMZ-Destructive.exe 4484 MEMZ-Destructive.exe 4484 MEMZ-Destructive.exe 4484 MEMZ-Destructive.exe 3928 MEMZ-Destructive.exe 3928 MEMZ-Destructive.exe 2132 MEMZ-Destructive.exe 2132 MEMZ-Destructive.exe 4628 MEMZ-Destructive.exe 4628 MEMZ-Destructive.exe 2132 MEMZ-Destructive.exe 2132 MEMZ-Destructive.exe 3928 MEMZ-Destructive.exe 3928 MEMZ-Destructive.exe 4484 MEMZ-Destructive.exe 4484 MEMZ-Destructive.exe 3156 MEMZ-Destructive.exe 3156 MEMZ-Destructive.exe 3156 MEMZ-Destructive.exe 4484 MEMZ-Destructive.exe 4484 MEMZ-Destructive.exe 3156 MEMZ-Destructive.exe 3928 MEMZ-Destructive.exe 2132 MEMZ-Destructive.exe 2132 MEMZ-Destructive.exe 3928 MEMZ-Destructive.exe 4628 MEMZ-Destructive.exe 4628 MEMZ-Destructive.exe 2132 MEMZ-Destructive.exe 2132 MEMZ-Destructive.exe 3156 MEMZ-Destructive.exe 3156 MEMZ-Destructive.exe 4484 MEMZ-Destructive.exe 4484 MEMZ-Destructive.exe 4628 MEMZ-Destructive.exe 4628 MEMZ-Destructive.exe 3928 MEMZ-Destructive.exe 3928 MEMZ-Destructive.exe 4628 MEMZ-Destructive.exe 4628 MEMZ-Destructive.exe 4484 MEMZ-Destructive.exe 4484 MEMZ-Destructive.exe 3156 MEMZ-Destructive.exe 3156 MEMZ-Destructive.exe 2132 MEMZ-Destructive.exe 2132 MEMZ-Destructive.exe 2132 MEMZ-Destructive.exe 2132 MEMZ-Destructive.exe 3156 MEMZ-Destructive.exe 3156 MEMZ-Destructive.exe 4484 MEMZ-Destructive.exe 4484 MEMZ-Destructive.exe 4628 MEMZ-Destructive.exe 4628 MEMZ-Destructive.exe 3928 MEMZ-Destructive.exe 3928 MEMZ-Destructive.exe 4484 MEMZ-Destructive.exe 4484 MEMZ-Destructive.exe 3156 MEMZ-Destructive.exe 3156 MEMZ-Destructive.exe 2132 MEMZ-Destructive.exe 2132 MEMZ-Destructive.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 1860 MEMZ-Destructive.exe 8856 mmc.exe 9252 Taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 64 IoCs
pid Process 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe 4552 msedge.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
pid Process 9360 mmc.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: 33 460 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 460 AUDIODG.EXE Token: 33 8856 mmc.exe Token: SeIncBasePriorityPrivilege 8856 mmc.exe Token: 33 8856 mmc.exe Token: SeIncBasePriorityPrivilege 8856 mmc.exe Token: 33 8856 mmc.exe Token: SeIncBasePriorityPrivilege 8856 mmc.exe Token: SeDebugPrivilege 9252 Taskmgr.exe Token: SeSystemProfilePrivilege 9252 Taskmgr.exe Token: SeCreateGlobalPrivilege 9252 Taskmgr.exe Token: 33 9360 mmc.exe Token: SeIncBasePriorityPrivilege 9360 mmc.exe Token: 33 9360 mmc.exe Token: SeIncBasePriorityPrivilege 9360 mmc.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4552 msedge.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe 9252 Taskmgr.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 7996 mmc.exe 8856 mmc.exe 8856 mmc.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe 1860 MEMZ-Destructive.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2552 wrote to memory of 4484 2552 MEMZ-Destructive.exe 80 PID 2552 wrote to memory of 4484 2552 MEMZ-Destructive.exe 80 PID 2552 wrote to memory of 4484 2552 MEMZ-Destructive.exe 80 PID 2552 wrote to memory of 2132 2552 MEMZ-Destructive.exe 81 PID 2552 wrote to memory of 2132 2552 MEMZ-Destructive.exe 81 PID 2552 wrote to memory of 2132 2552 MEMZ-Destructive.exe 81 PID 2552 wrote to memory of 3928 2552 MEMZ-Destructive.exe 82 PID 2552 wrote to memory of 3928 2552 MEMZ-Destructive.exe 82 PID 2552 wrote to memory of 3928 2552 MEMZ-Destructive.exe 82 PID 2552 wrote to memory of 3156 2552 MEMZ-Destructive.exe 83 PID 2552 wrote to memory of 3156 2552 MEMZ-Destructive.exe 83 PID 2552 wrote to memory of 3156 2552 MEMZ-Destructive.exe 83 PID 2552 wrote to memory of 4628 2552 MEMZ-Destructive.exe 84 PID 2552 wrote to memory of 4628 2552 MEMZ-Destructive.exe 84 PID 2552 wrote to memory of 4628 2552 MEMZ-Destructive.exe 84 PID 2552 wrote to memory of 1860 2552 MEMZ-Destructive.exe 85 PID 2552 wrote to memory of 1860 2552 MEMZ-Destructive.exe 85 PID 2552 wrote to memory of 1860 2552 MEMZ-Destructive.exe 85 PID 1860 wrote to memory of 1436 1860 MEMZ-Destructive.exe 87 PID 1860 wrote to memory of 1436 1860 MEMZ-Destructive.exe 87 PID 1860 wrote to memory of 1436 1860 MEMZ-Destructive.exe 87 PID 1860 wrote to memory of 4552 1860 MEMZ-Destructive.exe 90 PID 1860 wrote to memory of 4552 1860 MEMZ-Destructive.exe 90 PID 4552 wrote to memory of 1532 4552 msedge.exe 91 PID 4552 wrote to memory of 1532 4552 msedge.exe 91 PID 4552 wrote to memory of 3328 4552 msedge.exe 92 PID 4552 wrote to memory of 3328 4552 msedge.exe 92 PID 4552 wrote to memory of 3328 4552 msedge.exe 92 PID 4552 wrote to memory of 3328 4552 msedge.exe 92 PID 4552 wrote to memory of 3328 4552 msedge.exe 92 PID 4552 wrote to memory of 3328 4552 msedge.exe 92 PID 4552 wrote to memory of 3328 4552 msedge.exe 92 PID 4552 wrote to memory of 3328 4552 msedge.exe 92 PID 4552 wrote to memory of 3328 4552 msedge.exe 92 PID 4552 wrote to memory of 3328 4552 msedge.exe 92 PID 4552 wrote to memory of 3328 4552 msedge.exe 92 PID 4552 wrote to memory of 3328 4552 msedge.exe 92 PID 4552 wrote to memory of 3328 4552 msedge.exe 92 PID 4552 wrote to memory of 3328 4552 msedge.exe 92 PID 4552 wrote to memory of 3328 4552 msedge.exe 92 PID 4552 wrote to memory of 3328 4552 msedge.exe 92 PID 4552 wrote to memory of 3328 4552 msedge.exe 92 PID 4552 wrote to memory of 3328 4552 msedge.exe 92 PID 4552 wrote to memory of 3328 4552 msedge.exe 92 PID 4552 wrote to memory of 3328 4552 msedge.exe 92 PID 4552 wrote to memory of 3328 4552 msedge.exe 92 PID 4552 wrote to memory of 3328 4552 msedge.exe 92 PID 4552 wrote to memory of 3328 4552 msedge.exe 92 PID 4552 wrote to memory of 3328 4552 msedge.exe 92 PID 4552 wrote to memory of 3328 4552 msedge.exe 92 PID 4552 wrote to memory of 3328 4552 msedge.exe 92 PID 4552 wrote to memory of 3328 4552 msedge.exe 92 PID 4552 wrote to memory of 3328 4552 msedge.exe 92 PID 4552 wrote to memory of 3328 4552 msedge.exe 92 PID 4552 wrote to memory of 3328 4552 msedge.exe 92 PID 4552 wrote to memory of 3328 4552 msedge.exe 92 PID 4552 wrote to memory of 3328 4552 msedge.exe 92 PID 4552 wrote to memory of 3328 4552 msedge.exe 92 PID 4552 wrote to memory of 3328 4552 msedge.exe 92 PID 4552 wrote to memory of 3328 4552 msedge.exe 92 PID 4552 wrote to memory of 3328 4552 msedge.exe 92 PID 4552 wrote to memory of 3328 4552 msedge.exe 92 PID 4552 wrote to memory of 3328 4552 msedge.exe 92 PID 4552 wrote to memory of 3328 4552 msedge.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\Malware-1-master\MEMZ-Destructive.exe"C:\Users\Admin\AppData\Local\Temp\Malware-1-master\MEMZ-Destructive.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\Malware-1-master\MEMZ-Destructive.exe"C:\Users\Admin\AppData\Local\Temp\Malware-1-master\MEMZ-Destructive.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4484
-
-
C:\Users\Admin\AppData\Local\Temp\Malware-1-master\MEMZ-Destructive.exe"C:\Users\Admin\AppData\Local\Temp\Malware-1-master\MEMZ-Destructive.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2132
-
-
C:\Users\Admin\AppData\Local\Temp\Malware-1-master\MEMZ-Destructive.exe"C:\Users\Admin\AppData\Local\Temp\Malware-1-master\MEMZ-Destructive.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3928
-
-
C:\Users\Admin\AppData\Local\Temp\Malware-1-master\MEMZ-Destructive.exe"C:\Users\Admin\AppData\Local\Temp\Malware-1-master\MEMZ-Destructive.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3156
-
-
C:\Users\Admin\AppData\Local\Temp\Malware-1-master\MEMZ-Destructive.exe"C:\Users\Admin\AppData\Local\Temp\Malware-1-master\MEMZ-Destructive.exe" /watchdog2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4628
-
-
C:\Users\Admin\AppData\Local\Temp\Malware-1-master\MEMZ-Destructive.exe"C:\Users\Admin\AppData\Local\Temp\Malware-1-master\MEMZ-Destructive.exe" /main2⤵
- Checks computer location settings
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe" \note.txt3⤵
- System Location Discovery: System Language Discovery
PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=how+to+get+money3⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x144,0x148,0x14c,0x140,0x150,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:24⤵PID:3328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2484 /prefetch:34⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:84⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:14⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:14⤵PID:752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:14⤵PID:2540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3728 /prefetch:14⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5852 /prefetch:84⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings4⤵
- Drops file in Program Files directory
PID:4800 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x264,0x268,0x26c,0x240,0x270,0x7ff7e9465460,0x7ff7e9465470,0x7ff7e94654805⤵PID:4664
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5852 /prefetch:84⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5948 /prefetch:14⤵PID:2124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5968 /prefetch:14⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5976 /prefetch:14⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6080 /prefetch:14⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6380 /prefetch:14⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4380 /prefetch:14⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1748 /prefetch:14⤵PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4284 /prefetch:14⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6328 /prefetch:14⤵PID:3288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6864 /prefetch:14⤵PID:1144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4568 /prefetch:14⤵PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6196 /prefetch:14⤵PID:960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6688 /prefetch:24⤵PID:5764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6460 /prefetch:14⤵PID:5956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2784 /prefetch:14⤵PID:6060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:14⤵PID:5952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7052 /prefetch:14⤵PID:5132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3140 /prefetch:14⤵PID:5608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7172 /prefetch:14⤵PID:680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6932 /prefetch:14⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7424 /prefetch:14⤵PID:5504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1100 /prefetch:14⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7580 /prefetch:14⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7472 /prefetch:14⤵PID:5720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7808 /prefetch:14⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8124 /prefetch:14⤵PID:5372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7296 /prefetch:14⤵PID:5344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7764 /prefetch:14⤵PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4496 /prefetch:14⤵PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7968 /prefetch:14⤵PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8224 /prefetch:14⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8512 /prefetch:14⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8020 /prefetch:14⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7848 /prefetch:14⤵PID:5644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=44 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8360 /prefetch:14⤵PID:680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=45 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7932 /prefetch:14⤵PID:6104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=46 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8824 /prefetch:14⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=47 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7432 /prefetch:14⤵PID:5276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=48 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9092 /prefetch:14⤵PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=49 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8932 /prefetch:14⤵PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=50 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8784 /prefetch:14⤵PID:5672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=51 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9364 /prefetch:14⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=52 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9312 /prefetch:14⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=53 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8252 /prefetch:14⤵PID:6608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=54 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7256 /prefetch:14⤵PID:6708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=55 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9744 /prefetch:14⤵PID:6300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=56 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9716 /prefetch:14⤵PID:6432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=57 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9908 /prefetch:14⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=58 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8072 /prefetch:14⤵PID:5816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=59 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7832 /prefetch:14⤵PID:6616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=60 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=10056 /prefetch:14⤵PID:6380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=61 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9492 /prefetch:14⤵PID:6996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=62 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8132 /prefetch:14⤵PID:6464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=63 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9868 /prefetch:14⤵PID:6380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=64 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9912 /prefetch:14⤵PID:1144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=65 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=10332 /prefetch:14⤵PID:5180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=66 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9972 /prefetch:14⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=67 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=10804 /prefetch:14⤵PID:5636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=68 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=10744 /prefetch:14⤵PID:7116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=69 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=10456 /prefetch:14⤵PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=70 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=10668 /prefetch:14⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=71 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=11220 /prefetch:14⤵PID:7404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=72 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=10912 /prefetch:14⤵PID:7500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=73 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=11308 /prefetch:14⤵PID:8092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=74 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=10936 /prefetch:14⤵PID:6980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=75 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=11636 /prefetch:14⤵PID:7188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=76 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=11616 /prefetch:14⤵PID:7604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=77 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=10520 /prefetch:14⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=78 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=10468 /prefetch:14⤵PID:6420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=79 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=11960 /prefetch:14⤵PID:7740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=80 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=12096 /prefetch:14⤵PID:7200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=81 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=11504 /prefetch:14⤵PID:8180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=82 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=11616 /prefetch:14⤵PID:1352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=83 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=12492 /prefetch:14⤵PID:9132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=84 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=11460 /prefetch:14⤵PID:7668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=85 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=12624 /prefetch:14⤵PID:7672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=86 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=13104 /prefetch:14⤵PID:9152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=87 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=13212 /prefetch:14⤵PID:8608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=88 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=13424 /prefetch:14⤵PID:8680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=89 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=13488 /prefetch:14⤵PID:8888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=90 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=12244 /prefetch:14⤵PID:7828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=91 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=13696 /prefetch:14⤵PID:8408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=92 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=14128 /prefetch:14⤵PID:8852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=93 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=13716 /prefetch:14⤵PID:7016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=94 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=13776 /prefetch:14⤵PID:7360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=95 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=13788 /prefetch:14⤵PID:7528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=96 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7352 /prefetch:14⤵PID:7016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=97 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8516 /prefetch:14⤵PID:9236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=98 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=13624 /prefetch:14⤵PID:9720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=99 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=14240 /prefetch:14⤵PID:9868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=100 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=12184 /prefetch:14⤵PID:7944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=101 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:14⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=102 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=14408 /prefetch:14⤵PID:9924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=103 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=14528 /prefetch:14⤵PID:10140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=104 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=14340 /prefetch:14⤵PID:9420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=105 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=14240 /prefetch:14⤵PID:7232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=106 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=14564 /prefetch:14⤵PID:7180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=107 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=14664 /prefetch:14⤵PID:9232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=108 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=14732 /prefetch:14⤵PID:9108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=109 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=13992 /prefetch:14⤵PID:9784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=110 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7748 /prefetch:14⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=111 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=14340 /prefetch:14⤵PID:684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=112 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=14756 /prefetch:14⤵PID:8816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=113 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=14756 /prefetch:14⤵PID:8708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=114 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=14792 /prefetch:14⤵PID:9992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=115 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=14368 /prefetch:14⤵PID:10720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=116 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4356 /prefetch:14⤵PID:10640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=117 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=14424 /prefetch:14⤵PID:10664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2296016386961113851,14578405504084563089,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=118 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=14952 /prefetch:14⤵PID:11076
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=virus.exe3⤵PID:2040
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x144,0x148,0x14c,0x120,0x150,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:2888
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=minecraft+hax+download+no+virus3⤵PID:1844
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x144,0x148,0x14c,0x120,0x150,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:1640
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=stanky+danky+maymays3⤵PID:3940
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x144,0x148,0x14c,0x120,0x150,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:3808
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=skrillex+scay+onster+an+nice+sprites+midi3⤵PID:3824
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x144,0x148,0x14c,0x120,0x150,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:2824
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=how+to+remove+memz+trojan+virus3⤵PID:5888
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x144,0x148,0x14c,0x120,0x150,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:5904
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=g3t+r3kt3⤵PID:4140
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x144,0x148,0x14c,0x120,0x150,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:5752
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=mcafee+vs+norton3⤵PID:4696
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x144,0x148,0x14c,0x120,0x150,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:2536
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=how+to+download+memz3⤵PID:5916
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x14c,0x150,0x154,0x128,0x158,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:5360
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=how+to+create+your+own+ransomware3⤵PID:4408
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x144,0x148,0x14c,0x120,0x150,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:4600
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://pcoptimizerpro.com/3⤵PID:4132
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x144,0x148,0x14c,0x120,0x150,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:5704
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://play.clubpenguin.com/3⤵PID:4540
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x144,0x148,0x14c,0x120,0x150,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:5744
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://pcoptimizerpro.com/3⤵PID:5232
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x144,0x148,0x14c,0x120,0x150,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:6024
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=the+memz+are+real3⤵PID:5660
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x148,0x14c,0x150,0x120,0x128,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:5488
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=the+memz+are+real3⤵PID:1988
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x148,0x14c,0x150,0x144,0x154,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:3976
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=dank+memz3⤵PID:4524
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x150,0x154,0x158,0x120,0x15c,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:1548
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=how+to+code+a+virus+in+visual+basic3⤵PID:5456
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x144,0x148,0x14c,0x120,0x150,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:5604
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=virus.exe3⤵PID:852
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x150,0x124,0x128,0x120,0x12c,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:1480
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=skrillex+scay+onster+an+nice+sprites+midi3⤵PID:5284
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x144,0x148,0x14c,0x120,0x150,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:5076
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=how+to+download+memz3⤵PID:6540
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x144,0x148,0x14c,0x120,0x150,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:6556
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=what+happens+if+you+delete+system323⤵PID:6220
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x144,0x148,0x14c,0x120,0x150,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:6256
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=how+to+code+a+virus+in+visual+basic3⤵PID:7092
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x148,0x14c,0x150,0x124,0x154,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:7108
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=minecraft+hax+download+no+virus3⤵PID:4072
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x148,0x14c,0x150,0x124,0x154,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:7076
-
-
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\System32\calc.exe"3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5336 -
C:\Windows\SysWOW64\win32calc.exe"C:\Windows\System32\win32calc.exe"4⤵
- System Location Discovery: System Language Discovery
PID:3756
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=montage+parody+making+program+20163⤵PID:4228
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x148,0x14c,0x150,0x124,0x154,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:2568
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=g3t+r3kt3⤵PID:6812
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x144,0x148,0x14c,0x120,0x150,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:6840
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=how+to+create+your+own+ransomware3⤵PID:1096
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x144,0x148,0x14c,0x120,0x150,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:6464
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=how+to+remove+memz+trojan+virus3⤵PID:4164
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x144,0x148,0x14c,0x120,0x150,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:6944
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=g3t+r3kt3⤵PID:5748
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x150,0x154,0x158,0x120,0x15c,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:6860
-
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe"3⤵
- System Location Discovery: System Language Discovery
- Runs regedit.exe
PID:7288
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\System32\explorer.exe"3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:7748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=how+to+download+memz3⤵PID:7340
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x144,0x148,0x14c,0x120,0x150,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:7352
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=minecraft+hax+download+no+virus3⤵PID:6708
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x148,0x14c,0x150,0x124,0x154,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:8032
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=batch+virus+download3⤵PID:7916
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x148,0x14c,0x150,0x144,0x120,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:7920
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=how+to+get+money3⤵PID:7320
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x144,0x148,0x14c,0x120,0x150,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:7512
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://softonic.com/3⤵PID:5600
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x144,0x148,0x14c,0x120,0x150,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:8120
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://motherboard.vice.com/read/watch-this-malware-turn-a-computer-into-a-digital-hellscape3⤵PID:912
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x144,0x148,0x14c,0x120,0x150,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:7656
-
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe"3⤵
- System Location Discovery: System Language Discovery
- Runs regedit.exe
PID:8696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=john+cena+midi+legit+not+converted3⤵PID:9012
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x144,0x148,0x14c,0x120,0x150,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:9036
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=dank+memz3⤵PID:8716
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x144,0x148,0x14c,0x120,0x150,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:5872
-
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe"3⤵
- System Location Discovery: System Language Discovery
- Runs regedit.exe
PID:7032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://motherboard.vice.com/read/watch-this-malware-turn-a-computer-into-a-digital-hellscape3⤵PID:9112
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x154,0x158,0x15c,0x130,0x160,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:6420
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=how+2+buy+weed3⤵PID:8376
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x144,0x148,0x14c,0x120,0x150,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:8848
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=facebook+hacking+tool+free+download+no+virus+working+20163⤵PID:8996
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x14c,0x150,0x154,0x128,0x158,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:7648
-
-
-
C:\Windows\SysWOW64\mmc.exe"C:\Windows\System32\mmc.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:7996 -
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe"4⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:8856
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=how+to+create+your+own+ransomware3⤵PID:7948
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x144,0x148,0x14c,0x120,0x150,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:5336
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=is+illuminati+real3⤵PID:9644
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x144,0x148,0x14c,0x120,0x150,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:9664
-
-
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\System32\calc.exe"3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:9424 -
C:\Windows\SysWOW64\win32calc.exe"C:\Windows\System32\win32calc.exe"4⤵
- System Location Discovery: System Language Discovery
PID:8964
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=is+illuminati+real3⤵PID:10180
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x144,0x148,0x14c,0x120,0x150,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:5668
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://play.clubpenguin.com/3⤵PID:3932
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x144,0x148,0x14c,0x120,0x150,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:9552
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=montage+parody+making+program+20163⤵PID:9444
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x144,0x148,0x14c,0x120,0x150,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:6428
-
-
-
C:\Windows\SysWOW64\Taskmgr.exe"C:\Windows\System32\Taskmgr.exe"3⤵
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:9252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=how+to+code+a+virus+in+visual+basic3⤵PID:8460
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x144,0x148,0x14c,0x120,0x150,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:7640
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"3⤵
- System Location Discovery: System Language Discovery
PID:9176
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe"3⤵
- System Location Discovery: System Language Discovery
- Runs regedit.exe
PID:9904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=is+illuminati+real3⤵PID:8408
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x150,0x154,0x158,0x120,0x15c,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:8968
-
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\System32\explorer.exe"3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:10124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=stanky+danky+maymays3⤵PID:8696
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x144,0x148,0x14c,0x120,0x150,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:10220
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://play.clubpenguin.com/3⤵PID:5196
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x144,0x148,0x14c,0x120,0x150,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:6468
-
-
-
C:\Windows\SysWOW64\mmc.exe"C:\Windows\system32\mmc.exe" "C:\Windows\System32\devmgmt.msc"3⤵
- System Location Discovery: System Language Discovery
PID:7672 -
C:\Windows\system32\mmc.exe"C:\Windows\System32\devmgmt.msc" "C:\Windows\System32\devmgmt.msc"4⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
PID:9360
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=internet+explorer+is+the+best+browser3⤵PID:9744
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x144,0x148,0x14c,0x120,0x150,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:9556
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=how+2+buy+weed3⤵PID:7448
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x130,0x148,0x14c,0x144,0x150,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:6756
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=the+memz+are+real3⤵PID:9108
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x144,0x148,0x14c,0x120,0x150,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:8816
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=skrillex+scay+onster+an+nice+sprites+midi3⤵PID:10552
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x144,0x148,0x14c,0x120,0x150,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:10564
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://pcoptimizerpro.com/3⤵PID:11092
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x14c,0x150,0x154,0x120,0x158,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:11104
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=virus.exe3⤵PID:10496
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x144,0x148,0x14c,0x120,0x150,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:10508
-
-
-
C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe"C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe"3⤵
- System Location Discovery: System Language Discovery
PID:10348 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122884⤵PID:10060
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=bonzi+buddy+download+free3⤵PID:10752
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x144,0x148,0x14c,0x120,0x150,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:10624
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=half+life+3+release+date3⤵PID:9672
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x144,0x148,0x14c,0x12c,0x150,0x7ffa1a8f46f8,0x7ffa1a8f4708,0x7ffa1a8f47184⤵PID:10860
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4228
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2324
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x248 0x3f41⤵
- Suspicious use of AdjustPrivilegeToken
PID:460
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:8908
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:7852
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD567f74625a0679b83e8201838a425986f
SHA11f01828bf44433193b7aa439e4a8d688feb26fcb
SHA2567b0db551a70e12a3612caa8a8073eec1b69fcfeb93172c39806a658b36204713
SHA512b76f764b8e997b18a2fd3922b23fab65ae67c4e471333cd4df24932f75a4aaa2e799c7a1bae694ddc5c3d26827e3f267a29d3a66a12441edaeec36e3a05a7b7b
-
Filesize
152B
MD5ea1c2801aa63b0b7d559edd3adc7cfdc
SHA1535995078ba0c227fe78a9bc340e848907e420e4
SHA256d5daf639f0e5d8039eb65ce05767ae58bfa4b04a6a5b0b01b7a42bfcecc9756c
SHA512877abc639d9913465eba3e82e2192a03d6e63ca341e0954c9b62b109d1f0547048423f4f0b6825c4a1846b7964f1bd14272663d7166df6a71446328f9241b06b
-
Filesize
215KB
MD5d474ec7f8d58a66420b6daa0893a4874
SHA14314642571493ba983748556d0e76ec6704da211
SHA256553a19b6f44f125d9594c02231e4217e9d74d92b7065dc996d92f1e53f6bcb69
SHA512344062d1be40db095abb7392b047b16f33ea3043158690cf66a2fa554aa2db79c4aa68de1308f1eddf6b9140b9ac5de70aad960b4e8e8b91f105213c4aace348
-
Filesize
37KB
MD5ae2b5e6fd36c38beb90ca24ed95ddb5d
SHA1b447190bb67f2a881b718f6cc70a136d698fc5fd
SHA256cf22d1a1efc7c1aae3bc34d87149304a0198ddd635df1d73ba4c87dac536a136
SHA5125bc508d40dc2d9f2b81582ad828ed01e0895db01178a3189383e58723597651f314b80c6c1ad16300dd8f886cc64d3bb9131d58e0f71f46bc3cb92d15a096db8
-
Filesize
81KB
MD50a7b46f388d1f7a3553b9128c6ca043f
SHA10712b4c5f1b985235d5a7e3edbba046532ddbaa3
SHA256016f7e2b94e1d76931de09e88efd65064d964868595b13a0ab16b13483522fad
SHA512b03a25ddbeafec814e97152acc577ac2533c1fa8fd9e1f00a47159d2764ebed4938601bf53f7891040405c0b3d2a4002ff966e8bcce8ffbf1e668b3fe1a0385e
-
Filesize
20KB
MD587e8230a9ca3f0c5ccfa56f70276e2f2
SHA1eb116c8fd20cb2f85b7a942c7dae3b0ed6d27fe7
SHA256e18d7214e7d3d47d913c0436f5308b9296ca3c6cd34059bf9cbf03126bafafe9
SHA51237690a81a9e48b157298080746aa94289a4c721c762b826329e70b41ba475bb0261d048f9ab8e7301e43305c5ebf53246c20da8cd001130bf156e8b3bd38b9b8
-
Filesize
28KB
MD51752326ce45c039f4c5e81ea24c27c35
SHA14a22a9151c3c94d170cd3d23659e8e1a5a6f0070
SHA25613dac981c708b9d1c6d7be7666ab5ff34718fe7d1362428217e88c75530774ad
SHA5127ca5eb8b11184b97b7ecfed373420f7b9926839edcd36ea6bcc37a09190478175c49d7cfdb6dcbf1ecc8f2570feec9a0ac8aae08442fddef7986330043ff2d08
-
Filesize
125KB
MD5a7c79e68f996a554b3b6b47b8316ae07
SHA14fd009ebb27b3a17e5d4fc531aa42e58cc8f5443
SHA2565b07178980344821d5bfd1c3b774e656d8d1769a7da200a67020db41c0207ac7
SHA512da320d4925c5f069c7cea915ad80b117b2e3040afb3340b1513032eadd83259a42f39e02157862ed5a5d00fd5f532dd463252a4b98e779e7419130a13816400e
-
Filesize
127KB
MD57071a0f7ad1eaa502ada20e83d0bbb72
SHA198ff551c9228e71c0ace4179ec4d71340a78a1ae
SHA2563a9ed63c1c8ed87eb9d37f4a326b084bafb88d1af3e529051a6fc269c8b2514b
SHA5122af3c972d38fabc4736ba9d1728dfa79a35a05e6d24f315d115454b31c827346ae2377482a56a67505c5adcfed08515df18139202034dc1f10c1a382720da37b
-
Filesize
55KB
MD568ecc58a934636e32b60461c4ee4f930
SHA18e8f1a3a09f4ea7aba307f4f23890eb0f867e4c6
SHA2568b61d8c123333fd1cbb0eb7aa361ef2220efa43dd08e13747b68d311de4810f1
SHA5127d4c8d057a8fae7168b6748a0179d46a0fac5c530b9747941aea29667d07b2a9d142e1171a63eb6bf9219906313ea3e283c3fc2803b534b7a782a7a284a8dfdd
-
Filesize
75KB
MD5ae33be5f729f04ebd4ec15a80c6dca6e
SHA1b7c80521db1da5c920f2aa8404050bf06c30f275
SHA2565acdd161607377549e9a92d45103826482e1dd9477930b2fe9ae3f222121c65d
SHA512c6649202c5a15249585b08c246d2881622bc7e827db9db914f32ef542e25c272950ed255f65e4e4941c4ca4f0139cbfa65c27326e1586b1edb8d9f9dd0d99c1e
-
Filesize
415KB
MD514a28fbbd5f2e571ee6ffdc53def1904
SHA1439a66c36c9373ff55a1abebee3c89d83ca3ed19
SHA2567f982f40aa37a7c000724b5a69ef41301758536d2e843b444e12dc69ca8dff09
SHA51232138cf019e59ea3caf6949f19e09251a88a9ec0e5b84f9fa34f60a3bc59cb3df8a5607803bf85ff82fa130397ed3afec76e1469519f53304fdb4af7917fbe79
-
Filesize
19KB
MD5eb0c706acb25a1c8c420d89fb619c485
SHA1ce1f35c112e3162341c1db1b6c3511671d4f00f5
SHA2568f65858dc0d5fdf3db0779873770e2eca6123dc5687c541a8d6a21dcf5bb6493
SHA5123d19ffec65da196dfefb41d388fe6a9b19b7e9140cc1acf87e52e1a4d3e2d6e9d52eff3a1a2eaa1a5487f3d437a08b6311b073bbedacd74673907151f6acd242
-
Filesize
288B
MD50bf0eeaf9bfe8c195bf2a4f93a839c19
SHA1d7da41b738214d4590171bef3671c51b7ced3c3f
SHA256ca67580f06cd6debe518aa01e3e5ccdf8555f4ecf7aac684c228eddc2d897575
SHA512a92b32d1eb4df7abb2af918df2fedb15be24adaeeb5ed45510787ad06cf3268436953c0556fc87047e61411036d5139e17e66351f9890799d4c568879635e9ea
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD55f510c97db50952291ac88827d843418
SHA1bfc1394632e8615eca5e69fe62562820dcd38e66
SHA256f185526d59b1f8c7bcec7b5b8f9c24f7797182faa81297e482b6c9e2ca10d3cf
SHA5123340bc34b007d976ffa1026c138d2d6768c72bb1e66d864dfa608a75f99605364c61b05a9accb28e2d6fbc8603d5c3b490266c8141f505195c88be4fd7d41bdf
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize48B
MD547470345c9e1f81a143df06dba63bd26
SHA18137cbdf77ff207a22b00eb137aec1f0a781063a
SHA256607d6f6fb6e7beae5018605f1904e8b5b9a9220915c6c57c69ef716f122d132a
SHA5125bf50f1cb307ef0449b9850fdc89180e33bcf5a1fc2ce6c7331046c6bf889adbe62c305f2c35f33085089bd10c8d5c5ef3f718a8e5b2280dc3e1eabac1fe2fce
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize144B
MD5c52c0e1c6e8697c3370f865e5b07022d
SHA1898cbde8f0d1d4700337daa4c06477272fb44d75
SHA2562fa51342fc9a9e05595255c8b657f277f2fdd6f5a1d0fa2797c9e432e3a35964
SHA512e2c4f4f7f5cf8d4d31d1602dde8ced60bb0ac4bc032cf9ca0ecebb27172987430057ae6fc8c88a8cd1a313f976474f2e1038c83f54b774ca8ad4c2692765024e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5e354b11263be11fa747438e54adfc122
SHA1d49b288b7411e7a758f4e28bfa16c43be0575620
SHA2565f9c0d17373c3dcb0a598b1b847b85a117c0da99e373056b7f601e2ce0675095
SHA512123b37db5a591fcf3ec56d9a64c0cb0a6e4e61fe866e421b30438fddf0b0d84b44c2956e8eb846d7b17f48881bb75c528464619b8893762bc242ebebe0944180
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize504B
MD55706aeff788fccac3f731e4619005b87
SHA1e2285761669eb0459184a6fad03eaf8dbf845757
SHA25606e5b1d0c4b4d0bb1ce51b8d9f5ab681985f214d4b05a4dc4b63f7e34b0edda3
SHA51255f900a769383ab39c8c5f2f13e4dcec09313d1282be601c692c1f63ea9b8149d733fdd88154a45ecaa33e8ce8544e3246204f629d5943df1e04102dafa33af2
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD50a8d700e9c741cc607e18072ec997a88
SHA1970abd708f6d28e20e15d56b106dcf7793066bbf
SHA256bc9511334483b0da31bdb844e23abaecad3c92dbb354650a5e6adca928d26081
SHA512340e6eb307e339dd94c9c763218b083827ff3ff426798889b3b735b24abca34f6a678449e227ae7627d4521ab3296a960908ff3de3a62f79d3c3c3e23bf7132c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize672B
MD59b370507b7f4e70882747734475b8bbd
SHA199839c52bdb99e26112ff70eef859286693ed367
SHA256793d2f7b980e5c780d5929c5fcfd8ebd9a5be627c349e7ece7e416154c862f9c
SHA512ee899e97a4a0265abeceff907561258415a6dac3487425b1d1e0134f5d8c04fe9d9f135b1bb5033919a37a1a9e697e7271d762379d42bf08d1e3698f4162bd5e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD53ea8d5039a77064e2132b137683dc4fc
SHA14b7b2c97129abe53cfcb0610343bba3207ff8883
SHA25602309f679802de5dc5e69372bdc6ae026a9b8d243d3a2d1629ddc4e512a9456e
SHA5123e374625ad49949f28bffda0bc37242ab4bcd7315f0da17bec90982702fe4314ad1e525e1bc51ded90b240bce755c393dfc8e884a798bb7442abc003fb72c35f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD5496df90cafdc48c0fa3408f17b57dd5d
SHA14b50414a631dd2cbb2ab95b6560336e9b0c81d8c
SHA2561343de72762e8d6c6e56170d70241d9e8f3941eba0d00ee9ac6ce73f1747090a
SHA5122aa8ed06171ceeae6c241b65c48d1858680a615ce7f72ddda21f0810bc57f577b48f090d9e85cc01bdf2e794f99953825088499497b131724294c0228148a233
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize672B
MD52e5f3bb2b005d7abec7f2ab5f197a661
SHA18517df36ee55a6c92df392e95e586917daf4c6e8
SHA2567dcd4d99129c254cc7c72b6b96b2fb8d4358b77be8ca596d2d4241c1ea991541
SHA512743a91a47dea891eb18a51cf1c02422862e9950cfd3a5a1342ac76359955b97454c98061ca2fe168e77a7b88d3589c4df18440dca174ac4657ae9027dac06893
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize672B
MD5fcd5b8c4f03ea9aea14b991bd1ffa902
SHA1a39e2c0af31534cebe7180808e138216156298f2
SHA25603a57c92c871f5b2e713f0eca2bdcfdc75bfb9da67c664a21327e93b0841d659
SHA512f878e7c8b38deb21600841247ed8057a7b87e2092f182abf33c6dd4b3fdbb9b346f5ea840fcc6844b97bcba660aa05900c088bba698d03a01230f2d00f593865
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD5ed8dc74d5828bc94924bd40e64366619
SHA1d4d494b67f71a4d957a8e7b79bc2b9e339616577
SHA25610f07d1e8ece0ea907a2fbe232e1ac7fad503f209fb3018d0a960b0b4dae8884
SHA512c9d4ef6cf80ce8e107ef39ba90d8dd8f915d3146fdad1a9b392e3a899dc78e449d3af46374ef31825e65c4592c76e8c847eb24ed2115455a25cb929406630605
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize864B
MD5cc633e6149e6b5fe157605efb130424b
SHA13e630191b72bf5f18faf14bdb5c5c0cd576e510c
SHA256ac56f0a399a0e70cf4aae1fc94d001420596e8979cc547cbb1ebc79509436fb8
SHA51291d7896e8d7eeab6360a13f7902bf1ef786ba398f1879c5c8ed75f84c760ec6df423f3d60f766577ea9c14259f206fd029bafbbbd0953ffa836f33c7b6f6ee3e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD55c1ee90abaa968fb3866e1debf98feae
SHA1217eceb25f1c972047b6a6cf8247ad70ca53591f
SHA25665462bf8c19be33d15b0c8d8414b29e4daa16aa2edceffc81e39c1f1717defbd
SHA5129721d49aeac6c12659869551c30d60c22c49392eca17217a6fa98ff23fb32833616d1761c76cf63ac8ded4e67f071665b450b707a4553aa4a30fc70f2458c838
-
Filesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
Filesize
784B
MD59903f76e82f5a1d43073283c53850e77
SHA16664f9dd2ad902af27a4c8fc3abd6bf875583fb7
SHA2566048ea30d08ebf3684a1baf716743102a76d0d82c86a0ba1f45b5e3467a0dd03
SHA5123859ac396a10337b582044d6d9f84f66d19b3396e64787870722797f7a660dfe1f72f157bcd8299817e2a7a55fcdcab3f86e4274465ffc847a6f06b145ea03d1
-
Filesize
2KB
MD55cfd5572dd41b6acaf925e12432ac829
SHA1191ca371b7728e5308da9d2eeaa9cebf5a5ac150
SHA256b918fd02239a12f921d8e731e03ba18dd0c9604d3e127860b555456945fa430e
SHA5126c56477881d14ce04b86c9395592c873ea7275ad9c31962ac8eb75188ebc64a713948f7bb47b19411d67cd484d5ddcb7336ac065d087fb1cd8e8ee4b63ca610e
-
Filesize
3KB
MD5dfabc78abdce9a1ded11f736a3a3504c
SHA1b656511cf7245bcb8b6ec299d093df6982034d5e
SHA256aaf7f3756e6c02f8439bd8f175539b490c4f0630161b4cf487cbedee56b20f18
SHA5124671ef05497c2e8b6a78573081c11c6c9ff6fda28b3635ee4ad858e1e9b898d8ea7a0a2bdb834efc9b21016e68f9ae30f7cdd5762aa9343a45c3e093d0dcff5e
-
Filesize
9KB
MD5a4c9c7344b0dc797965e34d52f4ce99d
SHA112ae61603fdeeaeda5fd6eed6d0ab2172d03e09d
SHA2563fc3a53fc5b5eb153594866199a68a84d6af6f4d753021e94d6d377465d46c59
SHA512eb157de91c1a8e080b6512001d2951735768da13f06b4233665ba85a3229852074816099d0a98770730894a003fc1efeb0d8cf5caf83fc4e35d9831a2b5193a4
-
Filesize
815B
MD55fa12879b0e44567bf94ae176a6fb661
SHA1439068ef3142e20b5d99b436540405694c1b8e8c
SHA256a622f45e13e812d085a1a644675026b8276e150968d3c680d74398ef5ecf6527
SHA51223be15267e81b16a05df9fbdf6c6e62525740b3ada278fd3e98c5ee52439193c30d2a517f89096ceb30fe85c1707145de251a8e6f416cb91fc9eea0a97347df2
-
Filesize
9KB
MD5c3e78f9538703b9cfe3f1dd584da9af9
SHA1c3828643a8e43bc115414390348fb1dea4ce3f4f
SHA256c2b3b9acea900a0a43307c2a47086930501f856373d8f78b03940742279c1458
SHA512eabad5445cbccdc61eb7d188518de4b136dacf1baba6619118a0e54c58f97fdd7860138dda7532f9a755c495be2630d402d8e3fd87bad1b491571d5bedfef64f
-
Filesize
2KB
MD5570546b757b0d3df7b43a49c75c71d3c
SHA1e7265fd2028d26cd93bbc43ce1a348f539d2f165
SHA2569ea71405abde0f79bbcbc56a9c1125f54e7ab5d301f6d4af909d95b4a97ceb3c
SHA512f9a3be63a87003e2c8da39d00686d9beb5bbe3c5a7b32a7e55d08da6cfaec92416adfcea9c1ef5fd1700bf4d2fb71fc0c8150ddae36e8fd39439810635cdc297
-
Filesize
2KB
MD5045cd76d6829848d408718904d9ca6f1
SHA1aec94c251a1c139b2d39f790f202d3c4a24fa12a
SHA2566ab79cd96fb796a5e59c8f308e7abd2ce235ac1ff6f43ae5e2d547179f40af1e
SHA5124baa7002d1fe841c84eda13b936f3b6f4cfa2c94be6d98b73b2e7752d9091c4b2672dd57b950d62170bb45713684a49277c902bce469370f17ef7b24efbc31b0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State~RFe59a34b.TMP
Filesize59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
Filesize
5KB
MD556d30d7f16a077071f845be0c1241354
SHA19602be3c21e83cadcd1aa583829165e18f866ea8
SHA25671c64cbab819ab00179a7955d7b49989afa484749f0ac4760eae75b60aca8404
SHA5121a5135d38f738becfb78740c2ce8c4211b1fcc709014294e1db227cad146d2ca9e671a4824894df333cae3cda93b2ded4f0047be833e90eb58a56e19c5ac077b
-
Filesize
6KB
MD5ca5e2e47910dffa2fcc400cb4b980a29
SHA1fc6e061a7ef2ffc6ca35116166e416a31444340d
SHA256a0a76e59b4f1c7999396b444fa898e155b713bca91305cd1774dc6a14786b942
SHA51203b96e7be897cb8087447f274ff0100b82715a7093509388733119dcf045b5183e4d08306ecc7f6be45309260cbe71e55d7c7338948e32bb4e71dacd43d7104e
-
Filesize
5KB
MD5140cdcf41fb959766ae90810609bcba1
SHA1032c8eae930528d6d736c4920381d60b64f49a62
SHA256ba98909301aa1aaf755619bef86210f723c2af59aa80dbedc6e0ff885c8d1ab6
SHA5127888ac799c8f34559fc1d6c14a0bb4847aa1041935b1c83901c1d8cef38bbceae853e105686253d8156ea9e2416da7ae37c2f489494f13b18a20a9e88a99a92d
-
Filesize
6KB
MD563d7fc8158f8aa69326ee9211668132e
SHA179a3920c689d25da9dfdd663c0f7a06bd3cb6267
SHA256b032a2ea58bbd43266d4f4da817d56505769fd89e690b541422646720cd3ec5e
SHA512a0e247e39733fdabc3155a8c2ef895729741f8d77c3641d46fe11ee4576b1db4bdf8318204c337215ef70282c621ebf55f4b2b213bb1e458a29bbff90473daaa
-
Filesize
6KB
MD58d702ee1306445492b4c82ba44ea984b
SHA141b2d1f3579955c6d26778df0123350908fc089b
SHA2565b28e1ca69465c56660c647a123b390d1900ee1394e48ca4e92ba17d9bba14c8
SHA5128f3211aa727b81b3d78c1de35d8c50aafbd8a2f75d495d76f3cfb5c113662c1334942a5d2d8600fa6bfb145c97d9cdc8508f278d6a9488e59922e429949571c7
-
Filesize
8KB
MD545bbd6199bb27e4bbf24307abc4e6441
SHA1333449fcabddc0e3f479b8c1808a62db7bc98033
SHA2566bd75ee37b43b8bd3dc369402e19a6fe48577140060b29be39fe394a91604fc1
SHA512bd6d05fde8b259736f3803f5f92ae14b06e925f1635efdabdfe4bb3adc9ddffe6268bf49b35a308ad7a7a9b74a33924268d425b0772558311fe21488c8942553
-
Filesize
8KB
MD53e7d356809c3c93c4949701962322d43
SHA1325939eef85bd1948895180aabf4583ba29733a9
SHA2563988ae00da06ab4484c2cd674f5c64924c565ad1e1021bd472825ea83720f4c2
SHA5121c941e03050336e7e5203b0cc8b922e3e5c3307c7736488f511abcb387de33ca20967158802202f45f3ea79300fdecaabb27b6bfae08148a97fadfe86a1bc016
-
Filesize
8KB
MD526ceac716579c2c3340124c4c7cf9b50
SHA1d074bb15e2ade5d093e793a01978786941ec62ba
SHA25690c5751fe5c9da2d6181843aa8c99782ed48b68d73bb964542498a07a3630a26
SHA51280667672ef4553b55ab772595590c1311e689077c00b001f8f4080d898e6785d190d53bf926eefa30f0cded2b5289e0d7b5a58abcde0b366027783d4a28b198f
-
Filesize
11KB
MD560275b4efb9ff7632a931746a263b52b
SHA195871c4aeeff5ce55cd3a04275b9735ab5170a51
SHA256e4b7a33279f11fecb8e4572a65d7aadddca0815cbcdb8c896340d8a6eb7a8ea7
SHA5121fcfa065f4337e3b34fbfeeb6c4e21bf53df49b23b06d42e6cc364cc7c5329927a406578d846b15dc5bdb3c280e806233c9586ab9d747952227468cc4f7ec32f
-
Filesize
8KB
MD5ff7f1765b24df13d92659157aa762ed0
SHA1fd5ec14c8529606c810bdcae312ecd80deb2bf16
SHA256c0a82dbdad3a374574d74e2f5cba36f05cc1ffe131c0c383442c08b037decb8f
SHA5121d913dc1d45a5826bed01bd03e3b92338b12c3b80de8bc9956477b3406d0451509ce0b00eda2f564e9f61eba58323d48b0dace1a04168780832cc55c46b2332e
-
Filesize
8KB
MD5ad8029d5938cb9c4de033c8cbd739cb6
SHA167f8e5d0c7a99fa062aa02740687178408e03a6b
SHA256cac4abb9daf69e4d976ab6579a464a77127992f2097b23de51f82f995dcab134
SHA5123284d92eaf48ed9a35dd51e318b9643a6231f7ceea0d33c018a7b479cab0dfdb8abc841fb45f378ebdb3004247a5bdc43f6137c41dac6534ab7826c250a3cfed
-
Filesize
11KB
MD575459d5967ad3ae3fc3dd4e98a5bb07b
SHA116569f398d4f63b3f519b00048bd0157e7126803
SHA256ad67b6053e31d761d781e7bc0828e7d66ff51573328ea2b5e1ba6e7623385883
SHA512d5e2cb966618d6b2846a9bd3ce6fb5bfb2eb0e681569c0b72d0ac8a1353e4de09a6e794ce2da98b42950d33fe3b3f2709a08bf3489ae44dfdb333e7381697d62
-
Filesize
6KB
MD5ac9e9eacbbeeb6fe3def616c434cf0b5
SHA1ff2376f96eee93f170506496a8f2428358f36b3a
SHA256b52ed42fbbe87d78959450d91e45f76b2e59ceab782424b827627b3d7e30d277
SHA5127d2facaf28bf7f8700557af4ce1a75238539bf410af0bb92353889f8af5621d2e9c619fe182c1e82b613389a827de53324fa287ade2dbc2c0856996d706717e8
-
Filesize
6KB
MD532232b719abf80fde3fa4fa929ff4385
SHA12585123342243c8e6549df040874e0a8c4413721
SHA256af520dd57a523e306ee41bee71cbe0baf7504ee4a31a70a366070c484a476f54
SHA512c480202a7a4f435c3392ef1fb92aa2d18686c4ca15d3044415e15f3a1a55972f34a5887d5eae3d7501f693b0ed9d1e7d9c4c2c6e84c8d26004127dff2b3f0cf1
-
Filesize
8KB
MD54c77b978d18c2cc15c2073edcf4c8cb1
SHA1a6ca15332ad656eb66ee58cbe8284a5f27b50c1d
SHA2563d3b33c9c4b75c65e35ed900b9a76576fa61891501268b259170d7e61ab1eca3
SHA5123fc8939bba2de84ae17bcfa35daeae784e9aabbfae3a1142281c9d9c59c6282454565d633cad74ca35b9c5b3ce2d86f6932f1dd32c9bd8c037c71255038abd24
-
Filesize
8KB
MD5c9d581cf5cfcab6fa226cd1ed3d577ff
SHA15e44ba64aaaef38df3ceb7a4ef9e1aa6061561ad
SHA2564068b0996667af9862df2b55e1cfdc53d9bb6322b9db4fa57b6633f71e7d3bcf
SHA512e3741d6cf0f8003592f9c8bb83028f901490636e28bad388f29a277288792abac2eaaebd0b3213df42741d06afa4799b5e8b9c6f541cac87618e31f62f7090fd
-
Filesize
8KB
MD534f835f7f79c7b32c4ce0a36c3d61dd7
SHA17c70bf3d25b082d7dcef7b23546b5b44125d27dc
SHA256403b72288a88b1db2a46a2cd8b33d15c731d29df8085b054a39530b12fe65382
SHA51235506bd8104a263dcd8ece07cd4b78ea56eacf479755b2b54b6f362abf0ff8cf71451f4cd9461ed099798313bacbe883ad2ced0b3b70725cfe91c4e22bed8cf6
-
Filesize
11KB
MD5a462237c095c501edfcedc69fc5c5859
SHA1b799136620c8a5f9735b5bb832eb51c3c340d80f
SHA256bb01a899fabf5ace58907e8144d05e8c78865350e4a795e9f9569267e61438de
SHA5122003310318b4d56befe03e9f13ea29a162940da0e08656a397f1e06bc8e2bb26506c748faa5b6ef02553ae3cd70cf7e48201faba564c042a1de6618732a98705
-
Filesize
11KB
MD561e6aa2f28a33a59a76de34d1a877855
SHA13bbb5bc4ab49133084c9bd27d267cba76a92d75f
SHA2564980fa5e87efee0e2cd2495303132a5545caa6e7cbb4aaec06510ea7861fb0c6
SHA5120ba4425fef26bb9542b446c91d7fcb4d63d0b730b6249dcad6a25014a945b4f3bca61ce8fdb07402346dd83f6ad80e87922f437bcb416b605773d8ce089bb450
-
Filesize
11KB
MD5f5e0a83ea594a2ce891793babbd24f36
SHA1111e4bbd5e445698c69cf75dcde3bf092ca5064f
SHA256561a8c43e659f0c295d6e6a09ae43e0c66a7019cac8d2e990455310b372fb630
SHA5129f816191e61c57118da4b292a8aeb85476f3ec7b304b5012db2ae9789bd2d51163073b955306325098d3d8e7198296ffb8bef1459874d29ae8191b5e509b59c4
-
Filesize
6KB
MD5d722886ff2f84f3b1fc09a5df62eac1f
SHA1ed9bf7aa5f8d71eb3e98af6951e1006d8f389047
SHA256587761adfe64bccc3cf6e3c1a0c30b357bf6cb5cb1a4c6b51e64e9df602e2910
SHA512a61e442e5ea8e592404b9ca371c49cda972ec6b864a9bb91e9c135c8c4e7e82de6f212f7a0abb0dd5390c18dd3c6c3b7306fb050ee4e5326df9930dde7893f9b
-
Filesize
6KB
MD5a6b94d598a54eaf7c5aae5e428965254
SHA16a1d25a72f4db59a6397b31227828cd185f90ed2
SHA25644ae36ad8201bc3fbdc3c482b2ff691b519028f57ff1de03b6b37949f1157bd5
SHA51235fb6bf007027db5d24ad779fa15ff57a16580c6cc4ed964c4d6ee71d25384cf25cb9cf2a0a28712390abed55fcd728dc336e6c319ddb783619351c1fdaca611
-
Filesize
8KB
MD5757400071bebb52064341dc19e468590
SHA12cd3d21ba8c9d41990e557c745f07885c59defed
SHA256c2bff6532dd1880e02a43cd7d171758e0abb314e8d26a9d3e014db3ede316b77
SHA512a58649d1dedf6c30236828939a631d60d33bfdaf087430c0fd5344c03ea09fa9dd7342947f0c92b0a22f04e4e8668463da653affc105d588df34eac9f793aa17
-
Filesize
8KB
MD5b606ba989d5999c0c6c49fa84f752cdd
SHA1156e700f31e8df99d64b28ccf153ffc627faf890
SHA256736e6508281a08366997178c078cc22cf9d196894311bff1546b0dd7bed4fa7e
SHA5126843256a5bf1b895998410761f396c8cfb4e3c33ed36429715f7dbc50d85cc0a95632430e7664babd65a110a4d2441790a9f51d8b709ad3b6904d71759377763
-
Filesize
8KB
MD5444a14fbd7afd5c951904a700ffdbb4e
SHA1b52a7dcd642a977f5e4502ddcf9fd3096b7cb465
SHA2566ed24560daba88afa0b4b129948a34aa6104271fc3b3c5a575edfe8e3b9d134e
SHA5126f65549813a4ee23d60f78d153228a28306602835e95d933969c87d573ed4e4e5c6561b7ff378d76112a4d88619ccd69186de361913936375b85add76a03660d
-
Filesize
8KB
MD5fa07cb56dfd646d83230acce34f6d7e6
SHA108ff542a18fb8e6e95d5c4355cf6ec1e96b55f9a
SHA256b4dd4779955896b258d4c0669e02c3eeda7256203ef47f746e2fc803389be73d
SHA512cfbdc0a9fa6c4f11aed9bebd6decadbef5f7a6431043ed7710b333d2914f0f1f00e2bec222a37b8559a23110037570554ca077a4e633a855aacf554cc961fd38
-
Filesize
8KB
MD5e3c9bc4501ee9ab6523fdf8a45602a19
SHA1b223869cb0643bab3b8fa4f7f36168218d92740e
SHA2563f7b3243721367458c63259c5ee7cff3711e46120d5662430d070fe237ddc1eb
SHA512b43f024806df112d3289d3ecd77e5dae7e5ed5c49b4627c2aba5c15bbd4b4712739deae0a4eb55e0f88d160ff8364855dc52b8b28858202fb6b28542e616c65c
-
Filesize
8KB
MD57ff1e413a48306c539e6e51014591d0a
SHA1ba798445191dc88d7680e2cbfd72d40737fe2cb3
SHA256ab844974da85b463820a45930d60d8bfe84c7ae5dc0bc74306d452207686c41e
SHA512074043bfd0a8f6d39778c7ed1f6a126c4bf85f75dea298d066688d157d64cc8cd1caa7594c2d2ed06733f7511f8d217cca20091898918b7f4376aa1ab488c2aa
-
Filesize
6KB
MD59e89ba11b3cdfed437876d1158934f03
SHA1ecb9e1b2506d305f49d0930d29899d93606077df
SHA2564325a7ab51c79ebab8e748a30559c4abbd7d8163b491bd4ae9bb95d45c7c0925
SHA512f11ec0c0fc2ef136be3ea0e894e40bdf7edb36f9997122fe956382b9a94c038ad36ba10af5d81847212eb508298d78e249de71a281a1ea200f7a19af7b268c16
-
Filesize
11KB
MD5feefd2e5133f9747c5d1e3641692beaf
SHA15405e71d60bf88dd47c25a0a59a6268c0f7b1b92
SHA25667d5c13c1e2ba57fbda26d628843d7a390b2ab41b542fc11bec3888651a9871e
SHA5121e2fabde6cbe2aa5ad46b8c2ec96f05a57781d6e81c615b08fa07004599c742a65e1112a4bf90f77887672635af58dda5bc62f74d2e0da4b6dec163ee30defbe
-
Filesize
11KB
MD5bd23a3b11bee6f001d5f03134cb978ab
SHA15a35c7f83eca69f5188d309977bae31977a0c8ee
SHA2564b423ba9b951c98ede7fb36709c16de4e25e0491714fae9adb84a2147314ee46
SHA512ba95b12ef923679fa9077090e29f7dfdcafa8f07c001df1cb53bdcf6228b7e9d404d248d0823ee904d2d15b2bc21800d7250e4df685d7336703a78ca7ff827e3
-
Filesize
6KB
MD50e5056ad9487f4fbe27a8b2a9bb521e7
SHA17914c7a14aa5865b2c2ad6c2bed57912a2ea7443
SHA25688ab47ab4e481a1847a8a568334ef87f2dede3b6c053736309799c7e44cfe748
SHA512fe5366eb6a45d03c1e5745b255962f8cbe315722929e5f60079a66a168fa3bab434c3cdb39bf8fd4398ef17f37e3fa41f6ea208086308123c656ba88cc60b243
-
Filesize
8KB
MD5995b707cb561912071b7456d497d6b39
SHA1bb9d64eb456157e54c331b63801463b1fb870776
SHA25629b12a646a6802bfedfca7ca8ea9b6c99368d4fe025cec67c21e2c67da6d1250
SHA512b06965efd523a181d5631770bc856fb566e57e91717eea47620f250338c01cd33cf59e66b67d256961e4f8210bb28668efe6f364f2ab4630641c5901387b74ac
-
Filesize
8KB
MD582b6682e54603a48459bd7d1c592351a
SHA1803aac7f8388050143862883516e4ae5858a04bd
SHA256da5d86eb267d4785e4b96fa18a059dd3f2cb830220912ea858bcd257c02cbf03
SHA512ee94b8af70c2561bc474c12bf9f6dcc328e8492397d4a857319eed97b9355c64a552f67d534dfd3d94c88eedc53f952e3668e4bd8d1c52526267d7ec4a124d94
-
Filesize
8KB
MD530246f0739a75e395bd0b60a29480bdc
SHA1c337cc0be8bbf478cfcdb02229ab74a91fe7b885
SHA256e25a5c9111c6f6d3e388752715f14e719fc0f7e21c9de03078f6c8afab17be68
SHA5122aaafc4d5ae4b0bc0a60a630ee8e1a3819056b0c7eb2889c6f3d661929bb8ecc8bb23767816972c95f9c7aaeeb96d3c3e6e102017f0ec212b549e4b48a0d1a7c
-
Filesize
8KB
MD56e2d184cf64d5faaa59d260e8aceb0c0
SHA12c31b84f8cf4270dbe2b28acb27166dac32cba7c
SHA256cc664b9b1d61dcf9f61e314333f09b92d475dc05d34338d9f3a7507d3185351d
SHA512c3329e8117d4c495312b99003943078e2316d9f70857aef73754bb45783812805ebdf96b0056e5f63539de5525810c2bd3ecd1d146cb91513d32139e96634c60
-
Filesize
11KB
MD55029c210c668bb088578ac99ee75ab84
SHA1b18970235fb1f4d758c50b94ab7f8a1358380403
SHA2566616331a3bc2adf4040f076c8d1470d1ce0704ceb07c793465a47f63eb2bdcf8
SHA5120d7a445fc5a3c36fee55dced848aff72dc4456f9f52e4c74a1a9f1e9a151674bd29df48b4b1faa997145d8a4608f0d7bc95d1454bbb50d03d324c6bd4e7a1692
-
Filesize
11KB
MD58035122ce003353247fcf5c6c0d62944
SHA10030fdd962e8755ee502687e021872201fa9d0fb
SHA256a10df6a1128387a371d2bf32af4975cdcc57c5a7b4422f261cb234b12b6c70ab
SHA5120e87056d301306bad3e033858e236c9cd9c2dfc18587d2d843a2352ca3e91ab3e78894941e8cd671353545bc15349ac549e9e8bab5cc920c385b83edd86b0942
-
Filesize
8KB
MD54e71718f47827dd5a92a34108b20005c
SHA1bfcf9eea756efa1148c2a900ba880e76c8ee5645
SHA256768e9e29566fa94ca7933a92fad0e5a643b4e0c3563cf144eff813c1ecea52a1
SHA512bf87249081ba33cff28bb717fdba4b8239ebff58a5df35107eb7b345e22e8065d3de8a5e2080a3a5956d1ede9b9f1bb00a744cd2e0cb6748314177808f6f3f09
-
Filesize
8KB
MD52cd0c1b0be8c404d8bc55e0644820e9e
SHA1ba745e744b0592fb93cf240d0baa4dffe6dda8be
SHA2566e667d02df405841a48ce9840afd5f76e624fbe2e4c38724f6a2c91762a1e28f
SHA5126a613707f2552adaa7a38af7e1bafc82e23fd6f6329b78a9b7670589a8daea064bf61522b6af0918d91f1805e43ffabb166c56eb947cf0460ffdff0271bef8f1
-
Filesize
11KB
MD5bbab1962a08278bac9b91e2edd4da3b4
SHA1cb410fc0ba57d174be5db93353e7322ce5163ceb
SHA2569b617ae23ef30f455d9d525a6f49c5d87771ce05cb934168cd3394bc942c9c5c
SHA51209c1e017bf346f3951bac834080572e675373e5f62776e895a8df843d5857bf59461b80225b395cbb8e70b2bb7134da493c593cd98c41905ddbae3ebdbd33fde
-
Filesize
8KB
MD5d34f92d442ec492e267fe1797b52d989
SHA1c7e578e859c63d61669ec1964a033d42626f9a9a
SHA256d39a12a8db2a5f9a4fd8cb046545acc3daee6a390b780b19c613b300766bfbc9
SHA51216e0f3ec606abb086ed1f21a751de1eb0ede78711d8aa86f564727e9efceea98d07fb3015bb1f255fa33a4a9441a373770185123b17d9eccf1099d1e58be56c3
-
Filesize
11KB
MD5aa66b3c848d0273d71effdf60518dc92
SHA1b2bd30ab957a5795ca407aac54a748049f03a005
SHA256eaf87d8be77bd67e3a121001c2747de0c110f822fa2a13da178196ea5246293a
SHA5128ada6f3e37e52ff9c45c68791e4ac3d6ad88bd9599b92742c39249347c44c606d85e9601da24ff555ff1b0b76a5263f92eff01d5e481369e55beefd6f235b554
-
Filesize
11KB
MD53a1607f4692fad08ae409ef6b24a87e5
SHA1791c7765db709c21c8a0760e68ea319aec483844
SHA25626fa61ea0cfaccfca65a511710c49bb50ac06bbb7ba968d646f7127c4a862d57
SHA512f55b10d7048a69db3d3bcfb3e68cb8cbe9cbe7aa74f294f45574173504f17396e865af114170cc1bd2ce3fc5f61d080cb1edaa83c41de4daede6f56dddfd898e
-
Filesize
11KB
MD5fce71730b8cb8baf1c3b1e8aabaa8371
SHA12757a2baf98c97473814d05393cbfceb333a010e
SHA256d8ea149131a50d7813d227a8d151ca38b5513320b8d9b38a988ee56116c09265
SHA512cf56d96e6e35d7ae8a3e1f9f68f91050a5c368053b824d0175ccfddca333b46b69ab488723dccfe5a5f406dc5f354bac2734c425bc59585e99712958e4360d2a
-
Filesize
11KB
MD5424408551f50f856b6cb889cd8dac14b
SHA1cadfb0f4225bdd71e94371a74924f4988e1b1ccd
SHA2564f13d55229768aa327463783ba13dfcac364a80084e28c16a16aa42dca447c0d
SHA512459b105b454058ea2303c56ac5311093379b2be861bde37f7914d721146f9c853b336da71c26ed35a8c6e424242ff376c163739441a3bf5597384ac56b293911
-
Filesize
11KB
MD547ddb92fdff2b8d253dcb1178a646edd
SHA18684f1966fbaf7fe07d746013ce08a02b6f5bcae
SHA2566b2d169fa2f0c9476900b7830a77d31ff15c3b3e0a7413224007a30ea06d11ed
SHA5122306520b0758e10c790e1e120589b52b7c0d41b2ed36c1dee192ab38b5177282e98ff37121d5141ab7b5b34afb15fb651f6f7d05bb9144d80a35b5729236186c
-
Filesize
8KB
MD5f93193c7bb4c9e3a29a8c950308c26da
SHA1b074e5ee8ef952573194d72149c39d5678fb68cd
SHA256345ac025ff7d85c0ca402ed28c479ff92d9bb15de4cc8d39f5673983b60c8376
SHA512c54867117977f95216e97fbd457a0271cdd4a1c8d56d4c5f6255f08e1c751d19d76326b3adc498ed236891209f6ce0d2fa05fb2da43c6fdac26e4ede51049a73
-
Filesize
8KB
MD5d7e220e50a414d124cde803381a53b6d
SHA189fd46d11b0a514f1cf8d9416c1dca4bd799e6ec
SHA256fbf108db1e441cb0355fbca06b24676f027ad1cf57f9a27a3726ca837e0f6fc0
SHA51233c7e61c0d2365a71608b97ca273a880671c9d30b320fd64dd9208775a7704d3b0d24e9c06691b877d944acdff79cf777b082772cabb774e19e6789fba802fb2
-
Filesize
24KB
MD5db0cc03b1657f5dda4b38846f4eb7157
SHA11deac63712a9f66b4a33ef65305ac5f0c678a34f
SHA2562b79c7a18fb021ed166360ffa784c4fb44b5784d7bc8e6187dfaa80ca4c07761
SHA51255dfbe0425daebd6fe6cf54019e690fd4dcd28917a91d1fa0db57bc120d84d2f11bf119d836b8f0cc2e5c1387fbeb911b1a08a452fc493c06850d80621f45f3d
-
Filesize
24KB
MD5fccad2652971ce1f105ce6354c7d5235
SHA147e2387537bb38fc7db14eb46607dbecc093796e
SHA256c9f86fcf54928f7f4f85f83bc696505cb63d1300f7a1ffad4b97f3cd92784c40
SHA51231a536c04ade93a676958046da98f24b439ac8541011be47d1514a6556788d052c1950cd37968c1a9bf57ce6e0b29db9ca3f2d22e28c8b6cb653527b0d74b3a5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize26B
MD52892eee3e20e19a9ba77be6913508a54
SHA17c4ef82faa28393c739c517d706ac6919a8ffc49
SHA2564f110831bb434c728a6895190323d159df6d531be8c4bb7109864eeb7c989ff2
SHA512b13a336db33299ab3405e13811e3ed9e5a18542e5d835f2b7130a6ff4c22f74272002fc43e7d9f94ac3aa6a4d53518f87f25d90c29e0d286b6470667ea9336ae
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize90B
MD56ad22dec5417bb90a36bf7fef14fe7c7
SHA1caf59a3cabeb4ce077f09beccd8079e9248b422f
SHA2562aa6acc32dc9842de2501470752416ea0afce35c3bfa6a6268ab03e140550c7b
SHA512f7c4c97f3bd9197a01e5fe278cdf8a8033904117016aa4c589a7563fa1b88cd2b28b01f39058a17bf61681e1fc516391eb571ddcd3d0f3d4fbdefde793984006
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe618c80.TMP
Filesize90B
MD533e1403da1a205820929f72e976fe87b
SHA1d25ea2e2dfb2961d65b982b07202dd00e8bcd634
SHA25625ab0ac98536e1f4572fea75b3f05cbe869d4935b525e2b6fcedb3fb3a78dfcd
SHA512ebcf71ecb5df0ff476f9e021e4435f2e8498a5054fde7701939693680a1463f26fe0743f39d0c7c37bda42160ba55967603153b177763fb9c53e05db752bdf65
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD51d3039ac1de05c1f5e2b0ced7bb1e659
SHA13375f242a9ee84aff6e6c266045b0e587e319eb5
SHA256f31461d65b9e2dd40d31327ed8a50a86aa81f27d00b00ffa784698e9f2107ac2
SHA5121a575c41963b214d3ce0b0649b2fc84ff1451082b87d3ffeb349c84f3909361e0a8c49d47ee1541448f3a78f248178a560d099e588eb814eed48c4dbb80759a6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe6164b4.TMP
Filesize48B
MD52ab8fae9420680f546e047c9d98d5943
SHA123e4711c4631eac2c62f525152703793bc352bd7
SHA256e5dbeec19db2c43b357872515f9177d065a40a7ebce71d279a6aa56fbc2fce42
SHA51242e71283a83f623fd2055fa9dafa6ea2d18f2b26e1934d1b7af86da1eef896426b00c197177b0c5e040e8c92570564fe8a12a50c4a38ae3ddce14df36887621e
-
Filesize
3KB
MD5aa4424e9153b9a765c89f1532818702f
SHA1e922f682de9273786bf15eaafa435daba11b350c
SHA2567a92b5966a091e6237c574f7d7625b96ff5e7870addbb5b55160dab1c352f3cb
SHA512f3d1d4e99672f0c84c1658e1073431d9a30a717d24668030062668019c8e921762326f8c0832ab9e7e4745e6dc44a648b4d3e043b5b153292d4b06d73fee94ff
-
Filesize
3KB
MD55ec93dd8d98e1e164442453b1bea4bb9
SHA17c1d1b7e33c4d1a0a0738f99e1548711c25d14d1
SHA256969ffba598c5205aa2b51d5bd60f0894fbf7632707e3adb2465503b63bf91731
SHA5125bad42683a277faec20c38b2af9fb1740893128d1e34ec54571c79c27aaa154161036d7c187b15430c251496c6cdd62e4b86bb0130893282369c993b4e33563a
-
Filesize
3KB
MD55774d6d9a681e03a3011e57c1c960a18
SHA1315605a5c5e84b9b7360d0537a8b2af9c49665c7
SHA256e689e27977f5877f564dc4bb345b9aafe6193c2a8b7fa9b45ca33c9c2c5c5025
SHA51288a69ca6d925873fa758ceb62cb3b026d85f13aee2f798575f1fc2c8c9d8604b9e538379619d67f409adad391f052f441f202d39a68ce78bc8d60a5106b94345
-
Filesize
2KB
MD581a1547ad3345446926a4edb409311e5
SHA1b9a2057440f2ca897965944ee3debc34e0ad8b34
SHA256adc543021c54c69c613f15efd4dbd9fb0abc026e0e8dd2a585db32f8b3f0d85b
SHA512aae90b7884e314b31d10e1b2f8dce6d6963cd6eedc8b590bcff5217f6ab3445f27a5b8105447ca174dad4ba2aa70e945f3aa30ed1d2022c3ba17ae88bad7beef
-
Filesize
1KB
MD5beb64c8ede49b675ff46328611e454c3
SHA1c566b834178875d63bc68106431faef2569bd3ee
SHA256552600eb43d9c9a74a0f5af9bcb70502207b4a3afef092d52cca1fe589c2df8a
SHA512318236e8b95252c6bbb57a23b900a5094a6fe4481f1621246e838f27ed18fa8bd313128f3e7cd03dad667e1e5622d655ad519a79724579a251625ac60e48a26d
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
11KB
MD5c4ccccaf6c710307adf90a0a49f38bcb
SHA19e527b2fa0c09c5b7a0ec1014af8b2d4c97b7249
SHA256a6c0b98da1c79b20e581f90b9509c4559828eeba8e906b4696e56576e7e8a270
SHA512731b70685975b4ed67cb7bcfde24196ea277ac16796a20953fe97cca6cd47c2586e8f7247e35c4abfc267e62a1edc077da473e2300ba4199db0cd339b77a35cf
-
Filesize
8KB
MD5b976bfcf8fd738e63a7e83238bbe72d0
SHA158d506d6a724efbe4aba6e3c798da613d146ef77
SHA256051b55cfb52cf0c55b163c12bc600dd2638e975326662566a082343c5e928f6d
SHA5121735b0427b28d64680255f94007ab43def272511bfbd327f7973fc5ce4aa2d67aeb9e294e34a433a00658fcc881d102f744f0d088c4ee2f822f2df9b151f4ad9
-
Filesize
11KB
MD51dee2ccdf96b5649d0765fb020ac2ae6
SHA10819e05c8f77a7395be7e6bfa7ce723fc275a3b3
SHA256a1d3b9f571c40dcb880144f1ac4915657270279f50e03784e8a70e25627b7213
SHA5124def9866a265aa82bdd6d88d625d00f8077bed5b085a678ca392a867e411a2355cd391d651a66f9a2b6ab6b2a670f27e56d8351b624da1b10f2d016af86c9a7e
-
Filesize
11KB
MD59c4153f87c3ef563e9bf84b35c0a42b8
SHA1478aacdf6ca58c1df2379b427115481e08eae23e
SHA2560b611b466f8df33cdf5c9734d1159f7051d3aa57949e384ac9f4d55cc216ad60
SHA512f38d6508509b8f8d8ccd5ec8211cd3fe860832cce75da75bd9f3eb372329aad4e5dd6bcb95121e2647d28325b0aacf210135a516360cd53513cafdec1872feb7
-
Filesize
11KB
MD5f296352d78efcc4d09a99fb9318cd7f8
SHA1729e3d30b0c7713fcfe68feceba934c961e53044
SHA256fa4e6294d72355b413e4233f30194e9502982984ea3a43e39366ec309aa16a54
SHA51291fa6ca61ea374f00833ebcf9c04994547f5c452221cf1b13f6881360f9673ce383e1560bbbe1ade9482a640d6f7491a77012ab6643e86d813a0d6a798476d11
-
Filesize
11KB
MD59f1bd569b038a7ee302f47df248b9b10
SHA1579286ea2df76b1478003f0a6c8ee7ffefff65dd
SHA2560e872078b1a34730df85924862d91e68bbe6fef94d07cf88d1812e373ffa4fbf
SHA512a910a43e7907b10248c1ea81bb610e9b0ddb06b3d5f212221cde7e4ae9efb9d319c7ca3b37cd5a0bc27bc18f62f636a7f935378366b7a8dea731c8d5ac2e4e02
-
Filesize
11KB
MD5c54c77288564e041ee58c6af237c4536
SHA133f9fbec8df6be05745d21a19be7d340dfa59034
SHA256c5628ec9763f6c8d4fb8c41cf86151bfbb3bf88bc07ce73de5713f519b99fda5
SHA512274bac5c3cfa4c1518a362ee4af1c9c1e16bc675b00d85012c8c2f78871050193e119e2a5bb8ff798968871db7cf3bfd9bc1e27b5028ec225086c354ea2dffbf
-
Filesize
11KB
MD50b0897af77e5fdc5f23993670ac264a7
SHA1b508e202a7740d29d1284763c6f04297424453c3
SHA256b5c0922cc8789c6a9dc85a178bd4927b005bf2c4794659c1d1256a5426acd958
SHA512fb589352d7e02ab7f66f39f7025973f5f104eae122da3e0d442c9f4d6eb1c6f4caeca63ff833a948b4d75c28919b55ecb6794eff03ee514cc3a70b317fb09738
-
Filesize
11KB
MD537a65f144062087cf8480cece85566d6
SHA153fc09834bfc5c0f5494afbd4095f43b02d65a63
SHA25607598507a5eaffc62b6620286dc9e99ae8e9a8b9728686a83807f7e56ed8c644
SHA5127a6d8f86abfe32ef41ad9e9978fce3d3337eaaa4da07ca2d63a060b214016b4f266e72811fb607b1eb10c7a8f74c19d8f57ba65025b0ad5217564cbfb2cf7e13
-
Filesize
11KB
MD50b6d9e0a778e6ac2affdb7cdf07e60be
SHA10115ab80af9d0d42e63f921c33c8a2c794c57efa
SHA256d8241c856a81e47071a4d35558cef44f9f0d77f1d2474b11649391548fc38f03
SHA51249e57affe501b41a63edad1fd5fb3276373928b7400498e458642bee50ec7cd9aa27eed7602edbe3d7d0d8cda0d662a8718269454e2b68c281a21d8ad9b2f947
-
Filesize
11KB
MD5fd752ed7bac6e6f3bc8811a138461a57
SHA148ef876255d217241e48682cb259463f3c18a809
SHA25628b97aaedf1d9e6d38226c1d0533a6e8d092e88f9f20207da47191fb4845ea5c
SHA512460e789292cb10a226faa706372689649b7472deb76ec6440c2e52690ff2af99f207d7b20c19e81e5e01941d0574ef03c77bf84d873d7b414c1374713391239c
-
Filesize
11KB
MD5dfec0bf5629ba84f2475b6ba008aa483
SHA1386674db27a8e342fbc65fe68e953acb41bd83d8
SHA25618d6ecd488dc2eb9a61e8c066e74f4f542ad5f159ff088ebad043bc230049045
SHA5122793084b390dd4d65ea72e435f6a9f00d5738c3c9189f190a428b1852cbcf949cdb9bfd231d75330cc55164b1b1bb74cdcbbc118770d79fd738184110a6b5536
-
Filesize
11KB
MD5e1a7454e1993f8ae36e25b5ccf60a7b4
SHA1f5aee89445d2e4ec993a0de34404d13ba7574fc8
SHA25664a3ca6993cabc890e936bfad3a3fce4461dd6b91c51f0ac731f179ae11894a0
SHA512435af3e6f7022bc2d91c13f010b808e39587bbcd204205360c92b82a39819e3c75483380716fe218e995b217b59c22d46af5c6d35996cec951d2d8c11a98dd24
-
Filesize
11KB
MD524ce2085d63a0802f9d1e1500553046f
SHA167f7ef3f1a5efcf65f047e0e9e6065ad88603cda
SHA256c70c7a8f22243166311a44643a99a26c66329337112e06acf91e946f291c0515
SHA51261b8186505e93be3a11dc9f3a57c24231552d4b90801dbd4716f424012a89707f9d7b27c6e00ef8d32791fdccf164ed385c96bb2751370fb7928cb8a33341c88
-
Filesize
11KB
MD51ca7a4d134a894ef5654c5477fd1e845
SHA1659d540cabf7c34b06d22954dbae104f9b2a1f37
SHA25635ee252e5f4b2a14e6bf33c791ca438e9f3b419df4510ebbcb76debc22006b81
SHA5124f07ef60afb9d8c93c8c95ff3d11e3fec42d2678737c89eefaa904f17fb3b51d9908b6ac9d805aaf038f776aa275f651148073902698b3ff6ccfbe9109077a0b
-
Filesize
11KB
MD5bf88d65a2ae4642814017d22435c95a7
SHA1305b707b37d3bc0d4c9984c4d6bba1a35acac225
SHA256dd99494e41c284559213b8a6b95b69dd8ddb6e3f75245be1f2718545799989a3
SHA512fb870dedb6d65154ce9edff507377f644dc9c8242e945165f4add91697394083e8a9dc1d6380a3048d2ed8684574623e1b712ee74e713307fe6ddd75c5c564af
-
Filesize
11KB
MD57f0f9efe6830a5a1973937789d96c777
SHA12bf1295ad01691850eec7b30f4b6f04331f56fdf
SHA25610be7cff56a0cb1fb9dc6288cc1b47bd42cddd50e445ab326caaa80e96e888c0
SHA512334e1cd0132ad86fe1effdd3f21a32b8e518ff4ab0c5564bc8f9bf71c7c34e3b0a41c9714d7de8dc19bd2630e5b6243656d80b956b3341320475a42247bf8f64
-
Filesize
11KB
MD5a698fb90b9f436822a4fa40df4a8253d
SHA1a5376eda4cca56796d0aad86c1723576ad05e4f0
SHA256ae514bc6ecc192259751f2850dcb9ed1dc8c31fc2a00f9d7a07592502817d1f4
SHA5120baaeadbf8a9d0fe44aba22c81a4306d9f1ee1664b704601c24bf87f503944c3a3b83aefa59642ec8df688e824856d8c505773fdb970bb3a36b10c62771a2cad
-
Filesize
11KB
MD5d2a86e2d94579be66b565f4f01dfaeb1
SHA189301cf99a26808dd357deae48c1f8b7713fa36e
SHA256030731892512f410e5b65b8a854c299d4e727fccd30879b0dcacf927165a3b99
SHA5124435ca50c77e36f6c314574fd34dcbb25991d25b6e77e979513509d9f46aede3c0757ba3a62b12a81c82f942d90f77601df37aa6ebfe08792c95562602c47eac
-
Filesize
11KB
MD58ea7d89437bff07b6ad984c509acb4d9
SHA103315679c76861fe98db001e0ba82d8250a1b938
SHA2566f13b745fc26458b4f2de5dbbb6ef7fd28ebab52f203b5ce2ba6e80dc1e8f28b
SHA512e67fd1a3a07aba153d1e48d0986663b7db7278c90000970e2d47eb6179b6ffd07b84a87bf131382840fd5f11cae1adb34870e02d815d34dc20ca0007cb7af7bd
-
Filesize
11KB
MD5ca61d6cb3d5d78bac16fc9947627b104
SHA1d211cabd60556048683fa22b0adb1aef658b5ff5
SHA256699b33f211568b17b05bed99a5fa392c91a9363e15a9dfdfd85c76ce25e9be20
SHA512f83d11861b3e328147b8c74f45bd03270bd45cd337cd7f697810dba97b10671490cdf6a6e47e014d169354bfbd58553b552a70cb6413293cf5bc1f68f1728542
-
Filesize
11KB
MD544426dd5b46d13d20097c9d0a8e2b1c2
SHA1971d99a8c25267db595d44446b332af2a1dd1851
SHA256848cf7eaa8c75ef779f7d52391cd748d23770a0b2e9ba6fcdccf5ce9d171c99c
SHA5124e83198cbd0856bafd4152fc2d70f961a20da8fb9743f7f63e2d8f165ec6b05f099b5feb72ce473507ee435b647173b0cdbee932e0d33be933234f1e7e51aa9b
-
Filesize
11KB
MD5672faa741b1a641bfaa81c7d427d2a2c
SHA1f2a3a280d89649a61f1fee98b207e78fcab5a6b3
SHA256bfc190ee74bdbe0009da5cc2da1b1e595007046af61300ff5a7bca7deb78505c
SHA5127b652f3b8945327d0d141f81c342b2db3081c598280ebb4c23b89345b1ca139e15925b74e5b289559a82e030a32fab3c86cbe88ef47116aaafa9b4fce07c952a
-
Filesize
11KB
MD5a254d2ebdba506de6014ff797c0266d3
SHA1b739a09f4f98b5ca651261222a8d1c3bf59ac552
SHA256d865374195ff7c6005d1dbc69b9b6cda208a679f415907dd984aaa8e906ba58d
SHA512e04187fcf1eca83ee9a52836d4b0575f7e686b30f57f2bc3bcc6d6232637035a5db7f25d0ee95d33f360b03e2e0642552a6a86bac0ac704bfd8219eda169ea90
-
Filesize
11KB
MD560eea699d18100d89940c8723bd66d95
SHA17972c780d0dfeceba7e18a3508a316b3423309a9
SHA256db756ae382fa023ffa791a608d7484a6af50b27fe42a8056cac0b1cc660042cf
SHA5129fd9d67d91e94c4b210d27876c3243e51a52ff7c3264295b6b35418bfc43847bd4d3c0184f4ace9b9685cc71e0eb33ab9c6be51286665f8e3c80eaab9fc0aaf4
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD5bad484b00559a28c05ea418be14e36fc
SHA17fc1905be0574316ab2e34f8796963a0208020f5
SHA25681a36d79c2e13fb52e3e3333f7f98a5217338dcfd00b1f2caf890c3f54d64701
SHA5122e41b053cabb8fd4b455c292292a9c213210216a5b535965777902c3b97caa2e49ea27a6772a49d366874440242b2c5eb013df03f8db834195a004c018c9c627
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD5715ee9b8ea5b7367adc608428f993e86
SHA1d78eadd6059666b826e69dceb6b05af34479ed31
SHA25610170792a757fcb45ad5abf2d9dd97ad3c41880b41f43b905de0cd432509785e
SHA5121e1a798e91fb1c9641798adcb16a9946714595a724c6e61fc8f5cc640d4cca25f29e71c8d5c089a29df0e727b333d41fee25c695f8a1d0b46c0ab105cb5f6128
-
Filesize
218B
MD5afa6955439b8d516721231029fb9ca1b
SHA1087a043cc123c0c0df2ffadcf8e71e3ac86bbae9
SHA2568e9f20f6864c66576536c0b866c6ffdcf11397db67fe120e972e244c3c022270
SHA5125da21a31fbc4e8250dffed30f66b896bdf007ac91948140334fe36a3f010e1bac3e70a07e9f3eb9da8633189091fd5cadcabbaacd3e01da0fe7ae28a11b3dddf